Question 21

The attacker responds to the request by sending ICMP and sets the destination address of the request packet to the broadcast address of the victim network.What kind of attack does this behavior belong to?
  • Question 22

    In the Linux system, which of the following commands is used to query IP address information?
  • Question 23

    Which of the following are the standard port numbers of the FTP protocol? (Multiple choice)
  • Question 24

    Because the server is a kind of computer, we can use our personal computer as a server in the enterprise.
  • Question 25

    Which of the following are functions of address translation technology? (Multiple choice)