ECCouncil Ethical Hacking and Countermeasures 312-50 Question # 46 Topic 5 Discussion

ECCouncil Ethical Hacking and Countermeasures 312-50 Question # 46 Topic 5 Discussion

312-50 Exam Topic 5 Question 46 Discussion:
Question #: 46
Topic #: 5

Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?


A.

Teardrop


B.

SYN flood


C.

Smurf attack


D.

Ping of death


Get Premium 312-50 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.