ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 52 Topic 6 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 52 Topic 6 Discussion

EC0-350 Exam Topic 6 Question 52 Discussion:
Question #: 52
Topic #: 6

Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?


A.

Teardrop


B.

Smurf


C.

Ping of Death


D.

SYN flood


E.

SNMP Attack


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.