Multiple Choice
Unfortunately hackers abuse the ICMP protocol by using it to
A) Send internet worms
B) Launch denial-of-service (DoS) attacks
C) Steal passwords and credit card numbers
D) Send spam
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q33: Remote Packet Delivery (where packets are delivered
Q34: Encapsulating packets so they can traverse the
Q35: The buffer between the outer network where
Q36: Another term for an IP packet is
Q37: Which transport layer protocol is connectionless?<br>A)UDP<br>B)TCP<br>C)IP<br>D)ICMP
Q39: The network that is an extension of
Q40: UDP uses a three-way handshake to establish
Q41: Which of the following is an example
Q42: _ describes network components that are connected
Q43: Which of the following is a valid