A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?
A. TCP
B. SMTP
C. ICMP
D. ARP
Answer: C. ICMP
Computer Science & Information Technology
You might also like to view...
Solutions with a pH in the bottom half of the pH scale are ____.
A. neutral B. acidic C. basic D. non-polar
Computer Science & Information Technology
Excel's ________ feature analyzes a selection in a worksheet and suggests chart types that best fit the selected data
A) Chart Wizard B) Chart Maker C) Recommended Charts D) Chart Styles
Computer Science & Information Technology
The objects in a front-end database use tables in the ____.
A. modules list B. ODBC database C. back-end database D. relationships window
Computer Science & Information Technology
Describe symmetric and asymmetric encryption.
What will be an ideal response?
Computer Science & Information Technology