Known as the ping service, use of ____ traffic is a common method for hacker reconnaissance and should be turned off to prevent snooping.

A. ICMP
B. UDP
C. SMTP
D. IPconfig


Answer: A

Computer Science & Information Technology

You might also like to view...

To investigate employees suspected of improper use of company digital assets, a company policy statement about misuse of digital assets allows corporate investigators to conduct covert surveillance with little or no cause, and access company computer systems and digital devices without a warrant.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When a fast transfer rate of data packets is more important than an error-free and accurate transfer, ____ can be used.

A. IP B. ICMP C. TCP D. UDP

Computer Science & Information Technology

The loop body of a Do…Loop While statement always executes __________.

a) zero times b) at least once c) more than once d) undeterminable

Computer Science & Information Technology