Certified Ethical Hacker – CEH – 312-50 – Question188

Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?


A.
Teardrop
B. SYN flood
C. Smurf attack
D. Ping of death

Correct Answer: A