What type of ICMP packet can an attacker use to send traffic to a computer they control outside the protected network?

A. Source Quench
B. Echo Request
C. Destination Unreachable
D. Redirect


Answer: D

Computer Science & Information Technology

You might also like to view...

Given the following method header, which of these method calls is incorrect?

``` public void displayValue(double x, int y); ``` a. displayValue(a, b); // where a is a long and b is a byte b. displayValue(a, b); // where a is an int and b is a byte c. displayValue(a, b); // where a is a short and b is a long d. All of these would give an error.

Computer Science & Information Technology

The base date for date and time data in Excel 2013 is ________

A) January 1, 1000 B) January 1, 1900 C) December 31, 999 D) December 31, 1899

Computer Science & Information Technology

Match the following PivotTable areas with the corresponding description:

I. PivotTable Fields task pane II. Filters Area III. Columns Area IV. Rows Area V. Values Area A. Organizes and groups data into categories on the left side. Each group name occupies a single row. B. Displays summary statistics, such as totals or averages. C. Subdivides data into one or more additional categories. D. Filters the data to display results based on particular conditions you set. E. Contains two sections that allow for the editing of a PivotTable.

Computer Science & Information Technology

____ attacks are designed to deny wireless devices access to the access point itself.

A. DoS B. Phishing C. Rogue AP D. Wireless DoS

Computer Science & Information Technology