A teardrop attack is best described by which of the following?

The attacker sends a packet with the identical source and destination addresses as the victim's computer.

The attacker delivers a series of overlapping, massive IP pieces.

The attacker uses a faked address to transmit UDP Echo packets.

To DoS targets, the attacker employs ICMP broadcast.

Correct Option - b

To get all Infosys Certified Ethical Hacker Exam questions Join Group https://bit.ly/infy_premium_group

We're passionate about offering best placement materials and courses!! A one stop place for Placement Materials. We daily post Offcampus updates and Placement Materials.

Qtr No. 213, New Town Yehlanka Indore 454775

admin@prepflix.in