Name the different ICMP message types

What will be an ideal response?


The following may be in any order. Host Confirmation, Unreachable Destination or Service,
Time Exceeded, Route Redirection, Source Quench.

Computer Science & Information Technology

You might also like to view...

A line chart

A) shows each data point in proportion to the whole data series as a slice in a circular pie. B) uses a line to connect data points in order to show trends over a period of time. C) separates one or more pie slices from the rest of the pie chart. D) emphasizes magnitude of changes over time by filling in the space between lines with a color.

Computer Science & Information Technology

Which of these is an Internet Explorer security feature that helps protect you from fraudulent websites that masquerade as legitimate sites and attempt to hijack your password and account information?

a. SmartScreen Filter b. Notification c. Digital signatures d. Protected Mode

Computer Science & Information Technology

Jose is working on a database that stores stock information. He needs to design a field that will allow a user to connect to a graph created in Excel. Jose should apply a(n) ________ data type

A) Calculated B) Attachment C) OLE Object D) Number

Computer Science & Information Technology

The ________ tool focuses on computer performance

Fill in the blank(s) with correct word

Computer Science & Information Technology