Question 21
The attacker responds to the request by sending ICMP and sets the destination address of the request packet to the broadcast address of the victim network.What kind of attack does this behavior belong to?
Question 22
In the Linux system, which of the following commands is used to query IP address information?
Question 23
Which of the following are the standard port numbers of the FTP protocol? (Multiple choice)
Question 24
Because the server is a kind of computer, we can use our personal computer as a server in the enterprise.
Question 25
Which of the following are functions of address translation technology? (Multiple choice)