What attack is primarily based on the fragmentation implementation of IP?

A.
Teardrop
B.
Exhaustive
C.
Spoofing
D.
Brute force
Explanation:
Teardrop attack – This is based on the fragmentation implementation of IP whereby reassembly
problems can cause machines to crash. The attack uses a reassembly bug with overlapping
fragments and causes systems to hang or crash. It works for any Internet Protocol type because it
hits the IP layer itself. Engineers should turn off directed broadcast capability.