To bypass some ICMP-filtering devices on a network, an attacker might send which type of packets to scan the network for vulnerable services? (Choose all that apply.)

a. PING packets
b. SYN packets
c. ACK packets
d. Echo Request packets


Answer:
b. SYN packets
c. ACK packets

Computer Science & Information Technology

You might also like to view...

A normalized binary number consists of three parts. These are:

a. sign, exponent, mantissa b. integer part, decimal point, fractional part c. sign, real part, imaginary part d. sign, integer, mantissa

Computer Science & Information Technology

?OneNote captures your ideas and schoolwork on any device so you can _____, _____, and _____.

A. ?stay organized B. ?share notes C. ?work with others on projects D. ?let others do your work for you.

Computer Science & Information Technology

A 3D model can be transformed in Photoshop. Define transform.

What will be an ideal response?

Computer Science & Information Technology

If you decide you don't like the changes you have made to a slide background, you can use the _______________ feature to restore the original theme and color theme formatting to a slide.

a. Original Slide Background b. Reset Slide Theme c. Remove Slide Background d. Reset Slide Background

Computer Science & Information Technology