Which of the following is based ENTIRELY on using ICMP packets?
A.
Social engineering
B.
NMAP
C.
Buffer overflow attack
D.
Smurf attack
Which of the following is based ENTIRELY on using ICMP packets?
Which of the following is based ENTIRELY on using ICMP packets?
A.
Social engineering
B.
NMAP
C.
Buffer overflow attack
D.
Smurf attack