1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
4 years ago
11

Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping

flood attacks where the attacker is trying to consume bandwidth. Describe an effective defense against such an attack. Your answer must have enough detail to show that you understand the concept.
Computers and Technology
1 answer:
tresset_1 [31]4 years ago
6 0

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

You might be interested in
Select the true statement about the motherboard.
Nata [24]

Answer:

it executes the commands sent to it by the applica software .

8 0
3 years ago
RDBMSs enforce integrity rules automatically. <br> a. True<br> b. False
IRINA_888 [86]

It is true. RDBMS enforce integrity rules automatically. Integrity rules are automatically enforced by RDBMSs.

Integrity rules are automatically enforced by RDBMSs. Because it contains the design choices made regarding tables and their structures, a data dictionary is frequently referred to as "the database designer's database." Any character or symbol intended for mathematical manipulation may be contained in character data.

Data points that are connected to one another are stored and accessible in a relational database, which is a form of database. The relational model, an easy-to-understand method of representing data in tables, is the foundation of RDBMS. Each table row in a relational database is a record with a distinct ID known as the key.

It is simple to determine the associations between data points because the table's columns carry the properties of the data and each record typically has a value for each property.

To know more about RDBMS click on the link:

brainly.com/question/13326182

#SPJ4

8 0
1 year ago
What are the 3 biggest advancements in computers?
Georgia [21]

Answer:

abacus . Mesopotamia or China, possibly several thousand years BCE. ...

binary math . Pingala, India, 3rd century BCE. ...

punched card . Basile Bouchon, France, 1725. ...

Explanation:

:)

6 0
3 years ago
Ray owns a gaming cafe where users can play video games on computers. These games involve rich graphics and need high processing
tankabanditka [31]

Answer:

thick

Explanation:

i took the test and got it right

6 0
2 years ago
In this screenshot, the circled item is the
gavmur [86]

Answer:

Favorites tab/bar

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is the maximum number of communication paths for a team of twenty people?
    5·1 answer
  • Using underlining and italics at the same time is which of these? A. allowed but might be overkill B. always a good idea C. not
    15·2 answers
  • ) Briefly describe the purpose of the DASH protocol in streaming videos.
    9·1 answer
  • One of the most common uses of spreadsheet are
    12·1 answer
  • Mr. Stevens is the principal of a high school. Why might he want to export data from a database of students’ exam scores?
    14·2 answers
  • Which of the following questions will most likely be answered by displaying data on a line graph?
    11·1 answer
  • You have just finished installing a network adapter adapter and booted up the system, the drivers. You open File Explorer on a r
    13·1 answer
  • How do you create multiple columns in Word?
    9·1 answer
  • Here is the model I’m working on and can’t figure it out this model shows the basic process of making a protein what are the str
    14·2 answers
  • Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original ma
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!