Respuesta :

It is the fragmentation that is being used by the attacker, which allows packets to slip by devices, which only inspect packets rather than the entire session.

Who is an attacker?

When a person tries or makes a successful attempt in accessing, and extract another person’s data and also deletes the data without any kind of prior information or verification is known as the attacker.

In the case of fragmentation attacks, the most common attack is made in the form of a service attack. If it is about cyber security, it is the fragmentation attack that targets TCP or IP and assaults them. This is done by overlapping the packets.

Thus, a fragmentation attack can also be prevented by putting together the fragmented data packets.

Learn more about an attacker from here:

https://brainly.com/question/13963455

#SPJ4