To bypass some ICMP-filtering devices on a network, an attacker might send which type of packets to scan the network for vulnerable services? (Choose all that apply.)
a. PING packets
b. SYN packets
c. ACK packets
d. Echo Request packets
Answer:
b. SYN packets
c. ACK packets
You might also like to view...
A normalized binary number consists of three parts. These are:
a. sign, exponent, mantissa b. integer part, decimal point, fractional part c. sign, real part, imaginary part d. sign, integer, mantissa
?OneNote captures your ideas and schoolwork on any device so you can _____, _____, and _____.
A. ?stay organized B. ?share notes C. ?work with others on projects D. ?let others do your work for you.
A 3D model can be transformed in Photoshop. Define transform.
What will be an ideal response?
If you decide you don't like the changes you have made to a slide background, you can use the _______________ feature to restore the original theme and color theme formatting to a slide.
a. Original Slide Background b. Reset Slide Theme c. Remove Slide Background d. Reset Slide Background