Watch this video on YouTube
If a cyber attacker sends traffic in a manner that a system is unable to reassemble the data packets, what type of attack is being carried out?