The _________ attack is designed to circumvent filtering rules that depend on TCP header information.
A. ?source routing ?
B. ?IP address spoofing
C. ?network layer address spoofing ?
D. ?tiny fragment
D. ?tiny fragment
Computer Science & Information Technology