M
Q. Which of the following demerits does Fragmentation have?
Explanation by: Mr. Dubey
fragmentation makes the implementation of the ip protocol complex and can also be exploited by attackers to create a dos attack such as a teardrop attack. fragmentation won’t be required if the transport layer protocols perform wise segmentation.
You must be Logged in to update hint/solution
Be the first to start discuss.
Related MCQs
Q. directive is used to indicate the beginning of the program instruction or data.
Q. Which of the following is not comparison operator?
Q. Class diagrams are not useful to ________
Q. A graph that has neither self loops nor parallel edges is called_____graph.
Q. can a crisp set be a fuzzy set?
Q. Programs like shell and editors (ed and vi) interact with the kernal by invoking
Q. An approach that permits the computer to work on several programs instead of one is
Q. A self – balancing binary search tree can be used to implement
Q. specifies the function that will be called when a successful re-connection is completed.
Q. ________ uses the services of the system under design to fulfill the goals.
Question analytics

Discusssion
Login to discuss.