I believe it is B hope this helped you<span />
Software to damage computers
Answer:
d. ICMP Echo Reply (type 0)
Explanation:
ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.
The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.
For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.
Answer: Access Quick Access commands using the More button
Explanation:
In order for Robyn to ensure that a command she frequently uses is added to the Quick Access toolbar, then she needs to Access Quick Access commands using the More button.
This can be done by clicking on Customize Quick Access Toolbar. Then, Robyn will then click More Commands then he'll click on file tab in the Choose commands from the list. The command will then be chosen and then click on Ok and it'll be added.
Answer:
They
are indirectly involved in the attack because they do not verify the the MAC/IP address
association
Explanation:
PLEASE MARK ME AS BRAINLIEST