our network is experiencing an excessive amount of pings to your network server. The pings are from outside the network. Someone suggests that you set an access list to block ICMP packets coming into the network. How would you respond?

What will be an ideal response?


You can’t block ICMP packets because ICMP is a basic TCP protocol used for transferring data packets.

Computer Science & Information Technology

You might also like to view...

An uncaught exception:

a) is a possible exception that never actually occurs during the execution of the program. b) is an exception that occurs for which the matching catch clause is empty. c) is an exception that occurs for which there are no matching catch clauses. d) is another term for a thrown exception.

Computer Science & Information Technology

An exit status of________indicates that the child process completed successfully.

a) 0. b) 1. c) –1. d) None of the above

Computer Science & Information Technology

Most Web developers use ____ to enclose the filename for the background image as the value of the background-image property.

A. single quotation marks B. double quotation marks C. ampersands D. none of the above

Computer Science & Information Technology

To select adjacent text in Microsoft Word 2016, after selecting the first block of the text, press and hold the Alt key and use the mouse to drag and select as many other blocks of text as required.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology