1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
14

In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of

packet to confirm that the host computer is live?a. ICMP SYN-ACK packetb. ICMP SYN packetc. ICMP Echo Reply (type 8)d. ICMP Echo Reply (type 0)
Computers and Technology
1 answer:
Hoochie [10]3 years ago
4 0

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

You might be interested in
Suppose that Alice wants to send Bob a 50 kilobyte message over a 1 Gbps link. The total time required to transmit the message (
svlad2 [7]

Answer:

170 Mbps

Explanation:

Time taken to put data on to the link T1 = 50kB / 1 Gbps = 0.0004096

Time taken for transmission T2 = 2 milliseconds = 2 * 10-3

--> throughput = ( 1 / (1+T2/T1) ) * bandwidth of link

= ( 1 / (1 + 4.8828125) ) * 1 Gbps

= 0.16998672 * 1 Gbps

= 169.98672 Mbps

= 170 Mbps.

8 0
3 years ago
Universal Containers needs the ability to generate contract documents. All the data required for a contract resides in a custom
Fittoniya [83]

Answer: (D) Select and install an App Exchange product to meet the contract generation needs.

Explanation:

The App exchange is the type of salesforce market place in the cloud platform and it included various types of cloud application and the services. We can select and then install the app exchange different types of product and services to meets the given generation needs.

The app exchange service is mainly used in the universal container that mainly needs for generating the document in the system. The user can able to install and access this type of app salesforce easily.

Therefore, Option (D) is correct.

 

6 0
2 years ago
Write a program that performs a simulation to estimate the probability of rolling five of a kind in a single toss of five six-si
VikaD [51]

Answer:

import random

def probability_five_of_a_kind(num_trials):

   sums = 0

   for _ in range(num_trials):

       roll_1 = random.randrange(1,6, 1)

       roll_2 = random.randrange(1,6, 1)

       roll_3 = random.randrange(1,6, 1)

       roll_4 = random.randrange(1,6, 1)

       roll_5 = random.randrange(1,6, 1)

       collection = roll_1 + roll_2 + roll_3 + roll_4 + roll_5

       if collection == 5:

           sums += 1

   prob = round(sums/7776, 8)

   print(f"The probability_five_of_a_kind is {prob}")

   

probability_five_of_a_kind(100)

probability_five_of_a_kind(10000)

probability_five_of_a_kind(1000000)

Explanation:

The random package of the python language is used to select an integer value from the range of one to six representing the sides of a die. All six rolls are randomized and the sum. If the sum is equal to 5, the sums counter is incremented. At the end of the loop, the sum is divided by the five dices events (which is 6^5 = 7776).

8 0
2 years ago
How to drive more website traffic?
lidiya [134]

Hello there,

How to drive more website traffic?

Answer: Advertise

8 0
3 years ago
Given the class 'ReadOnly' with the following behavior: A (protected) integer instance variable named 'val'. A constructor that
Dafna1 [17]

Answer:

I believe you want a subclass so here it is!

public class ReadWrite extends ReadOnly {

public ReadWrite(int initialValue){

super(initialValue);

}

private boolean modified = false;

public void setVal(int x) {

val = x;

modified = true;

}

public boolean isDirty() {

return modified;

}

}

Explanation:

I might be wrong, just check through it in case

Hope this helped

:)

7 0
3 years ago
Other questions:
  • Show what this program prints. Be exact and complete. Can you explain the behavior of each print statement? 1 2 3 4 5 6 7 public
    12·1 answer
  • What is an example of a good URL?
    7·2 answers
  • It is important that data being imported from a text file into access are separated by a character, such as a comma, which defin
    8·1 answer
  • An automated service that consolidates and distributes information from newsgroups, blogs, forums and news websites is called
    11·1 answer
  • My friend has a battery of 9000mah and loses 10 every day how many days well it take to go to zero
    13·1 answer
  • What is normalization?
    7·1 answer
  • What is a field on a table
    13·1 answer
  • Product of -6/13 and reciprocal of -7/16 is ____________​
    7·1 answer
  • How to fix a blue screen
    9·2 answers
  • What is the difference between a computer’s RAM and its hard disk?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!