1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
14

In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of

packet to confirm that the host computer is live?a. ICMP SYN-ACK packetb. ICMP SYN packetc. ICMP Echo Reply (type 8)d. ICMP Echo Reply (type 0)
Computers and Technology
1 answer:
Hoochie [10]3 years ago
4 0

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

You might be interested in
Which question is MOST important for an office to consider when upgrading to new software
Marina CMI [18]
Either B or D those are the most reasonable answers if it were up to me to answer i would pick B but that is up to you go ahead and try your best i hope u have a nice day ✨✌️✨
6 0
3 years ago
A palindrome is a string that reads the same both forward and backward. For example, the string madam is a palindrome. Write a p
miskamm [114]

Answer:

Explanation: Hey bro! Sorry to bother. But have any of your questions got deleted after posting them? I don't know why my question got deleted by a guy.

8 0
3 years ago
If a company doesn't distribute a computing use policy stating an employer's right to inspect employees' computers freely, inclu
tester [92]

Answer:

False

Explanation:

Without any police, a privacy can easily be compromised.

8 0
4 years ago
Which color is considerd to be a cool color?
scZoUnD [109]
It depends on personal tastes and what it's applied on.

For example: I like Blue. I think Blue is cool! But, I also think red is cool, on a sports car. I think it would have to be Red, but thats what I think. The same with orange. Green for a T-Shirt is cool as well!

Remember that if you want to find out what color someone likes, just ask them. Generally though, Red is considered to be cool for most things.
8 0
3 years ago
Read 2 more answers
Once you have selected the range of cells for your table data, from which tab can you open the Insert Table dialog box?
Anuta_ua [19.1K]

A. Insert Tab. Specifically, The insert tab, then click "Table" which will open the Insert Table Dialog Box. Good luck!

3 0
4 years ago
Read 2 more answers
Other questions:
  • Do opportunity costs only occur when making spending decisions
    5·1 answer
  • Which element of the word program window contains buttons for saving a document and for undoing, redoing, and repeating a change
    5·1 answer
  • Help?!<br> Does anyone know how to use Adobe SoundBooth?
    14·2 answers
  • to the nearest millimeter a cell phone is 123 long and 54 mm wide what is the ratio of width to length
    12·1 answer
  • Decide what activity is most appropriate based on the temperature. If the temperature is greater than 80 degrees, then display t
    13·1 answer
  • The ability to send and receive transmissions at the same time on an ethernet cable is referred to by what term?
    7·1 answer
  • Write one similarity and one difference between '_' (underscore) ' % ' wildcard symbol .
    11·1 answer
  • No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program
    9·1 answer
  • What format can be applied to text in Excel?
    7·1 answer
  • software that opens files and scans their code to look for certain types of malware is known as software.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!