Known as the ping service, use of ____ traffic is a common method for hacker reconnaissance and should be turned off to prevent snooping.
A. ICMP
B. UDP
C. SMTP
D. IPconfig
Answer: A
You might also like to view...
To investigate employees suspected of improper use of company digital assets, a company policy statement about misuse of digital assets allows corporate investigators to conduct covert surveillance with little or no cause, and access company computer systems and digital devices without a warrant.?
Answer the following statement true (T) or false (F)
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
Answer the following statement true (T) or false (F)
When a fast transfer rate of data packets is more important than an error-free and accurate transfer, ____ can be used.
A. IP B. ICMP C. TCP D. UDP
The loop body of a Do…Loop While statement always executes __________.
a) zero times b) at least once c) more than once d) undeterminable