You must be logged in to read the answer. Go ahead and login, it'll take only a minute.
Before we study the vulnerabilities in TCP/IP, we should know a bit about the layers and it's functions.
Protocols used: TCP (connection-oriented), UDP (connectionless)
How three-way handshake work?
Download our mobile app and study on-the-go. You'll get subjects, question papers, their solution, syllabus - All in one app.