Ping of death attack -explanation: the ping of death attack involved sending ip packets of a size greater than 65,535 bytes to the target computer. ip packets of this size are illegal, but applications can be built that are capable of creating them. carefully programmed operating systems could detect and safely handle illegal ip packets, but some failed to do this. note: mtu packets that are bigger than the maximum size the underlying layer can handle are fragmented into smaller packets, which are then reassembled by the receiver. for ethernet style devices, the mtu is typically 1500. incorrect answers a: a man in the middle attack allows a third party to intercept and replace components of the data stream. b: the smurf attack, named after its exploit program, is one of the most recent in the category of network-level attacks against hosts. a perpetrator sends a large amount of icmp echo (ping) traffic at ip broadcast addresses, all of it having a spoofed source address of a victim. d: in a tcp syn attack a sender transmits a volume of connections that cannot be completed. this causes the connection queues to fill up, thereby denying service to legitimate tcp users.