Trace use ____ messages to verify that the destination host is reachable, and if not, give possible reasons for the problem.

A. TFTP
B. HTTP
C. IP
D. ICMP


Answer: D

Computer Science & Information Technology

You might also like to view...

Class-level variables are declared using the ____ keyword.

A. Dim B. Public C. Private D. Class

Computer Science & Information Technology

Provide at least five different suggestions for how to protect your privacy online.

What will be an ideal response?

Computer Science & Information Technology

The third line of a header in multiple page letters and memos contain the  ____________________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You are tasked with configuring a wireless SOHO router for a customer.Which of the following settings will be the most secure with the least effort and cost to the customer?

A. WPA2-Enterprise B. WPA-PSK, TKIP C. WPA2-PSK, TKIP D. WPA2-PSK, AES

Computer Science & Information Technology