Which of the following protocols needs to be denied?

A network technician is concerned that an attacker is attempting to penetrate the network, and
wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid
on the network. Which of the following protocols needs to be denied?

A network technician is concerned that an attacker is attempting to penetrate the network, and
wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid
on the network. Which of the following protocols needs to be denied?

A.
TCP

B.
SMTP

C.
ICMP

D.
ARP



Leave a Reply 0

Your email address will not be published. Required fields are marked *