The malformed packet attack technology uses some legitimate packets to perform reconnaissance or data detection on the network. These packets are legal application types, but they are rarely used in normal networks.
Correct Answer: B
Explanation
Note: 4 types of network attacks: First, traffic-type attacks: commonly used Flood mode, send a large number of seemingly legitimate TCP, UDP, ICMP packets to the target host, and even some attackers also use source address forgery technology to Bypassing the monitoring of the detection system, thereby draining bandwidth or server resources. The second is scanning snooping attacks: using ping (including ICMP and TCP) scans to identify surviving systems on the network to identify potential targets and identify target weaknesses. The third is a malformed packet attack: by sending a defective packet to the target system, the target system generates an error when processing such an IP packet, or causes a system crash, which affects the normal operation of the target system. The main methods are ping of Death and Teardrop. The fourth is special packet attack: using some legitimate packets to reconnaissance or data detection on the network. These packets are legal application types, but they are rarely used in normal networks.