1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dolphi86 [110]
3 years ago
6

Which of these would NOT be a valid Internet Control Message Protocol (ICMP) error message:

Computers and Technology
1 answer:
wlad13 [49]3 years ago
7 0

Answer:

(c) Router Delay

Explanation:

The network layer of the TCP/IP provides a mechanism or tool for troubleshooting and error messaging called Internet Control Message Protocol (ICMP). Network layer devices such as routers may use this tool to communicate errors especially if there is an issue delivering data packets.

Some of these error messages are;

i. Source Route Failed

ii. Source Host Isolated

iii. Network Unreachable

iv. Host Unreachable

v. Destination Network Unknown

vi. Destination Host unknown

Note:

Router delay is not one of the error messages identified by the ICMP.

You might be interested in
What's is the contribution of technology to the country?
slamgirl [31]
To help us get news from different countries
8 0
3 years ago
When troubleshooting firewalls, you should never attempt to repeat the problem because you could do more damage. T/F
Zinaida [17]

Answer:

TRUE

Explanation:

the given statement is correct hence TRUE

troubleshooting is problem solving often applied to repair failed product .

Firewall is used for network security for the computer is monitors and controls the incoming and outgoing network traffic.

Basically what Firewall do is it create barrier between trusted networks and not trusted network.

8 0
3 years ago
Malware is a combination of which two words? A. malevolent and software B. malignant and software C. maladapted and software D.
ladessa [460]

Answer:

D. Malicious and software

5 0
4 years ago
Sketch a 3-view orthographic projection of the object shown
vichka [17]

Answer:

Explanation:

/|_/]

6 0
3 years ago
Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
amid [387]

The L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

<h3>What is vpn?</h3>

VPN is known as a Virtual Private Network extends a private network across a public network and activates users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

The main difference between VPN proxy and a VPN is encryption and VPNs hides all the web activities performed by the user as well as user's private IP address.

Therefore, the L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

Learn more about VPN here:

brainly.com/question/17272592

#SPJ4

3 0
2 years ago
Other questions:
  • How old do you have to be to get paid to wave at liberty tax in Abilene tx
    8·2 answers
  • He primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open. true false
    5·1 answer
  • Collaboration, listening, and negotiating are considered _____ skills.
    5·1 answer
  • Title text boxes on every slide must be the same format.<br><br> A) True<br> B) False
    8·2 answers
  • You're familiar with the story of Hansel and Gretel, so when you decide to go exploring you always make sure to keep track of wh
    14·1 answer
  • What does API stand for
    7·2 answers
  • Adding software to a digital device, or adding hardware components to a digital device is called _____ .
    13·1 answer
  • Below is the prototype for a function that takes two pointers to integer variables as its parameters. The purpose of the functio
    14·1 answer
  • Selection Sort List the resulting array after each iteration of the outer loop of the selection sort algorithm. Indicate the num
    10·1 answer
  • When formulating a linear programming model on a spreadsheet, the decisions to be made are located in the data cells.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!