ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 207 Topic 21 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 207 Topic 21 Discussion

EC0-350 Exam Topic 21 Question 207 Discussion:
Question #: 207
Topic #: 21

Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?


A.

Teardrop


B.

SYN flood


C.

Smurf attack


D.

Ping of death


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.