adplus-dvertising
frame-decoration

Question

If any given address is running live, it will return an ICMP ECHO reply.

a.

True

b.

False

c.

May be True or False

d.

Can't say

Answer: (a).True

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. If any given address is running live, it will return an ICMP ECHO reply.

Similar Questions

Discover Related MCQs

Q. __________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.

Q. ____________ scanning is a procedure to identify active hosts on your network.

Q. _____________ scanning is an automatic process for identifying vulnerabilities of the system within a network.

Q. Which of them is not a standard scanning type or terminology?

Q. In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication.

Q. ________________ is a tool which uses traceroute-like techniques for analyzing IP packet responses.

Q. In port scanning, a _________ is always associated with an IP address (usually of the host system) & the type of protocol (UDP or TCP) employed for communication.

Q. Firewalk tool employs a technique to determine the ___________ rules in place on the ___________ forwarding device.

Q. Firewalk works by sending ________ & ________ packets.

Q. Using 3-way handshake, it is possible to check for open ports.

Q. Which of them is not a standard flag used in TCP communication between client and server?

Q. How many standard flags are used in TCP communication?

Q. Which of the following is not a valid scanning method?

Q. ___________ is a command-line TCP/IP packet assembler and analyzer tool.

Q. Which of the following is not a feature of Hping2 tool?

Q. _________________ is quite an esoteric process for preventing session creation through a particular port.

Q. Which one of them is not a network scanner?

Q. Which of them is not a port scanning tool?

Q. Which of them is not a vulnerability scanning tool?