Internet Control Messaging Protocol
If you use the -T switch, it'll be TCP
D. Rise of NASA.Hope I helped.
Source code contains instructions written by a programmer specifying the actions to be performed by computer softwa
Answer:
Option a: Trojan
Explanation:
A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.
However, Trojan cannot be replicated in the infected computer.