1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
5

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed throu

gh a firewall, for ping to operate correctly?
Computers and Technology
1 answer:
alexgriva [62]3 years ago
4 0

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

You might be interested in
Im trying to learn c# for unity does anyone know any good sources
viva [34]
Lynda.com is a very good source to start with. Totally recommend you to check it out
5 0
3 years ago
An electronic braille embosser that translates text from a braille keyboard to a printer:
MArishka [77]

An electronic braille embosser that translates text from a braille keyboard to a printer is Mountbatten Brailler-Braille Embosser. The Mountbatten can be connected to a printer allowing files to be printed as text, while a regular PC keyboard can be connected to the Mountbatten enabling text to be produced as braille.

6 0
3 years ago
Explain the difference between social engineering and reverse social engineering.
san4es73 [151]
Social Engineering is the art of eliciting sensitive information from people by tricking them. Like through phishing, fake emails that contain a virus and fake programs. They get your password or any other sensitive information by making you think the website/program is legit. That's why you should always make sure the new website/program you visited is safe.

Reverse Social Engineering is, on the other hand, where the initial attacker becomes attacked. Or the victim redirects the attacker to someone who can counter the attacker. E.g attackers call the front desk and ask for information X. Instead or giving him information X, front desk redirects the call to the security department. An example is where the attacker is fed false information. Law enforcement agencies often perform this attack.
5 0
3 years ago
Help me. thank you very much
Scilla [17]

Answer:

3425236235623523334252362356235233342523623562352333425236235623523334252362356235233362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233  5623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363425236235623523334252362356235233342523623562352332

Explanation:

342523623562352333425236235623523334252362356235233342523 6235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425 5236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233

4 0
2 years ago
6. Why did he choose to install the window not totally plumb?
Dmitriy789 [7]

Answer:

Because then it would break

Explanation:

You achieve this by obtaining correct measurements. When measuring a window, plumb refers to the vertical planes, and level refers to the horizontal planes. So he did not install the window totally plumb

8 0
3 years ago
Other questions:
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    7·1 answer
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • Using python:
    10·1 answer
  • How is a technical certificate like a computer-related associate degree?
    12·2 answers
  • Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, fir
    9·1 answer
  • What does digital mean, in the term of computer science.
    11·1 answer
  • Dora has inserted a text box into a Word document that she is formatting. Which strategy will not format text boxes? Create a li
    6·2 answers
  • 3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length an
    10·1 answer
  • "code is broken down by the computer until it is in _____and is a very long series of ons and offs
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!