How ICMP is used in ping and traceroute facilities
Answers were Sorted based on User's Feedback
Internet Control Message Protocol (ICMP) pings and
traceroute on the PIX Firewall are handled differently
based on the version of PIX and ASA code.
Inbound ICMP through the PIX/ASA is denied by default.
Outbound ICMP is permitted, but the incoming reply is
denied by default.
** ASA/PIX does not support ICMP redirects, because it does
not support asymmetric routing
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / sachin
it is used in finding out the error message like if data
gram is not reaching to the destination.It is reliable
protocol as compared to Internet protocol.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / hasan
ICMP works on
echo-request n echo-reply
in network communications devices echo-request/reply's open
open in network security devices echo-request/reply is
close as inbound traffic is restricted by default.
so by this process of echo-request n echo-reply the PING
and traceroute works and gives the information that the
channel is established.
Is This Answer Correct ? | 0 Yes | 0 No |
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode
Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share
How can you add the 192.168.100.0/30 network to EIGRP without involving the 192.168.100.4/30 network as well?
MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation
Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation
Identify the 2 commands the saves the running-config to NVRAM? A.) write memory B.) copy running-config startup-config C.) write network D.) write backup
what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?
Which statements are true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not at the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth
what is stub router
What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable
Which command we use for ping in ipv6?