M
Q. Which of the following demerits does Fragmentation have?
Explanation by: Mr. Dubey
fragmentation makes the implementation of the ip protocol complex and can also be exploited by attackers to create a dos attack such as a teardrop attack. fragmentation won’t be required if the transport layer protocols perform wise segmentation.
You must be Logged in to update hint/solution
Be the first to start discuss.
Related MCQs
Q. Voice privacy in GSM cellular telephone protocol is provided by _______
Q. Which one of the following deletes all the entries but keeps the structure of the relation.
Q. (p → r) ∨ (q → r) is logically equivalent to
Q. d = {"john":40, "peter":45}
Q. __________is used to implement virtual memory organization.
Q. The broadband jammer jams the entire
Q. Which of the following is the fastest logic
Q. Name one of the factors that govern the span of management.
Question analytics

Discusssion
Login to discuss.