This is true, for every decision you make there is a trade-off.
Explanation:
1. How many computers do you want to connect or how big the network should be?
This would tell us what kind of a network need to be built. It can be LAN/MAN/WAN
2. The location where network needs to be built?
We have to check the geographic condition too before creating a network
3. What is the budget?
Based on the budget only, we can decide the wires to be used if require we can negotiate the budget so that we can create effective network
4. Will I get an additional resources to work?
This is essential to estimate the time that is required to complete the task.
5. When the project needs to be completed?
This is crucial because a business might be planned thereafter.
Answer:
ICMP.
Explanation:
Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.
ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.
In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.
<h3>What is this stage about?</h3>
This is known to be the phases of development where there is Analysis or one can say requirements gathering and where one has clearly set out problem or project as well as others.
Note that In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.
Learn more about Analysis phase from
brainly.com/question/13897351
#SPJ1