What is the result of packets that are created which exceed the MTU of the network?  How can this process be exploited?

What will be an ideal response?


Packets that are larger than the MTU must be fragmented, or broken into multiple segments that are small enough for the network to handle.

After a packet is broken into fragments, each fragment receives its own IP header. However, in IPv4, only the initial packet in a set includes a header for higher-level protocols. Most filters need the information in the higher-level protocol header to make the decision to allow or deny the packet. Accordingly, attackers send only secondary fragments, which are any fragments other than the initial one. These packets are often allowed past the IDPS because filter rules are applied to first fragments only.

Computer Science & Information Technology

You might also like to view...

During recursion, if the stack attempts to grow beyond its limit, a _____________ occurs.

a. Stack underflow b. Stack overflow c. Recursive underflow d. Recursive overflow

Computer Science & Information Technology

____________________ is the level of detail in an image.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ can compare the portion of the gross revenue to the total gross revenue

A) revenue B) percentage of sales revenue C) net income D) percentage of physical volume

Computer Science & Information Technology

The growth of the ICT industry has a generally upward trend.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology