What method can be used to mitigate ping sweeps?
- using encrypted or hashed authentication protocols
- installing antivirus software on hosts
- deploying antisniffer software on all network devices
- blocking ICMP echo and echo-replies at the network edge
Explanation: A computer can have a worm installed through an email attachment, an executable program file, or a Trojan Horse. The worm attack not only affects one computer, but replicates to other computers. What the worm leaves behind is the payload–the code that results in some action.
Exam with this question: CCNA Security Chapter 1 Exam Answers
Exam with this question: Module 3: Quiz – Mitigating Threats Network Security
Exam with this question: 3.4.2 Attacking the Foundation Quiz
Exam with this question: 4.4.2 Attacking What We Do Quiz
Please login or Register to submit your answer