The pingutility uses ____________________ packets to query by IP address or by name.

Fill in the blank(s) with the appropriate word(s).


ICMP

Computer Science & Information Technology

You might also like to view...

The_______ keys are the physical buttons on a wireless device that enable a user to navigate between documents.

a) soft. b) hard. c) touch. d) None of the above.

Computer Science & Information Technology

Write a code fragment that allows a user to continue inputting numbers until she enters a sentinel value of 0. Then print the sum of all the numbers she entered. You may assume that a Scanner object named input has already been created.

What will be an ideal response?

Computer Science & Information Technology

A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.

A. threat modeling B. risk assessment C. attack tree D. attack modeling

Computer Science & Information Technology

To develop a security plan, the first step would be to ________.

A. assess the current state of the company's security B. prioritize security projects C. create comprehensive security D. determine needs

Computer Science & Information Technology