1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
14

In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of

packet to confirm that the host computer is live?a. ICMP SYN-ACK packetb. ICMP SYN packetc. ICMP Echo Reply (type 8)d. ICMP Echo Reply (type 0)
Computers and Technology
1 answer:
Hoochie [10]3 years ago
4 0

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

You might be interested in
You are most likely to use<br> images for photos or digital paintings.
Lubov Fominskaja [6]

Answer: Digital Paintings

7 0
3 years ago
What is the network id with cidr notation for the ip address 172.16.32.108 with the subnet mask 255.255.255.0?
kow [346]
172.16.32.0/24






-------------------------------
7 0
3 years ago
This OS was created by a developer named Torvalds.
GREYUIT [131]
The answer to this problem is Linux
7 0
3 years ago
Pick the correct statements on the 64-bit machine representation of numbers.
Cerrena [4.2K]

Answer:Floating-point arithmetic is considered an esoteric subject by many people. This is rather surprising because floating-point is ubiquitous in computer systems. Almost every language has a floating-point datatype; computers from PCs to supercomputers have floating-point accelerators; most compilers will be called upon to compile floating-point algorithms from time to time; and virtually every operating system must respond to floating-point exceptions such as overflow. This paper presents a tutorial on those aspects of floating-point that have a direct impact on designers of computer systems. It begins with background on floating-point representation and rounding error, continues with a discussion of the IEEE floating-point standard, and concludes with numerous examples of how computer builders can better support floating-point.

Explanation:

6 0
2 years ago
1. What is the global marketplace?
podryga [215]

.......................................

4 0
3 years ago
Read 2 more answers
Other questions:
  • Henri is working in a complex financial spreadsheet that has hundreds of columns of data. If he is at column AN and would like t
    11·1 answer
  • Utilities software and word processing software are both eamples of
    10·1 answer
  • Which unit of measurement related to quantity
    12·2 answers
  • Which best describes the relationship between maximum cost-per-click (max. cpc) bids and ad rank?
    12·1 answer
  • Which statement accurately describes DTP programs?
    11·1 answer
  • Which is an unethical use of technology and resources at the workplace?
    13·2 answers
  • Question 3
    13·1 answer
  • A file named loan.html, write an HTML document that looks similar to figure 9-7 in the textbook. Write four functions with these
    8·1 answer
  • What is the purpose of extent in lines in engineering drawing
    12·1 answer
  • To make changes to how UAC operates, you must be logged in as administrator true or false
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!