A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?

A. TCP
B. SMTP
C. ICMP
D. ARP


Answer: C. ICMP

Computer Science & Information Technology

You might also like to view...

Solutions with a pH in the bottom half of the pH scale are ____.

A. neutral B. acidic C. basic D. non-polar

Computer Science & Information Technology

Excel's ________ feature analyzes a selection in a worksheet and suggests chart types that best fit the selected data

A) Chart Wizard B) Chart Maker C) Recommended Charts D) Chart Styles

Computer Science & Information Technology

The objects in a front-end database use tables in the ____.

A. modules list B. ODBC database C. back-end database D. relationships window

Computer Science & Information Technology

Describe symmetric and asymmetric encryption.

What will be an ideal response?

Computer Science & Information Technology