Which of the following is a configuration option for the ping command?
A) The IP address of the destination
B) The timeout for an echo reply
C) The route to take
D) The default gateway of the first hop
A, B
Explanation: A) The route cannot be determined for ping, but the destination and timeout (wait time) can be configured.
B) The route cannot be determined for ping, but the destination and timeout (wait time) can be configured.
You might also like to view...
Compute the cophenetic correlation coefficient for the hierarchical clusterings in Exercise 16. (You will need to convert the similarities into dissimilarities.)
What will be an ideal response?
The internal name is the name of a file as it is known by the operating system.
Answer the following statement true (T) or false (F)
What is the precise definition of a primary key?
What will be an ideal response?
Match each item with a statement below:
A. when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers B. when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate C. provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform D. identifies a specific entity as the source or origin of a given piece of data E. traditional technique for detecting if data inadvertently changes during transmission F. takes the original data, divides it into digits, and encrypts each digit one at a time G. divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations H. a fixed-size checksum created by cryptographic hash functions I. the U.S. federal government standard for digital signatures, proposed by NIST in August 1991