The pingutility uses ____________________ packets to query by IP address or by name.
Fill in the blank(s) with the appropriate word(s).
ICMP
You might also like to view...
The_______ keys are the physical buttons on a wireless device that enable a user to navigate between documents.
a) soft. b) hard. c) touch. d) None of the above.
Write a code fragment that allows a user to continue inputting numbers until she enters a sentinel value of 0. Then print the sum of all the numbers she entered. You may assume that a Scanner object named input has already been created.
What will be an ideal response?
A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.
A. threat modeling B. risk assessment C. attack tree D. attack modeling
To develop a security plan, the first step would be to ________.
A. assess the current state of the company's security B. prioritize security projects C. create comprehensive security D. determine needs