Which of the following protocols needs to be denied?

A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?

A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?

A.
TCP

B.
SMTP

C.
ICMP

D.
ARP



Leave a Reply 0

Your email address will not be published. Required fields are marked *