Which pair of ICMP messages is used in an inverse mapping attack?
A.
Echo-Echo Request
B.
Route Solicitation- Time Exceeded
C.
Echo-Time Exceeded
D.
Echo Reply-Host Unreachable
E.
Echo-Host Unreachable
Which pair of ICMP messages is used in an inverse mapping attack?
Which pair of ICMP messages is used in an inverse mapping attack?
A.
Echo-Echo Request
B.
Route Solicitation- Time Exceeded
C.
Echo-Time Exceeded
D.
Echo Reply-Host Unreachable
E.
Echo-Host Unreachable