Which attack is being used when threat actors use pings to discover subnets and hosts on a protected network, to generate flood attacks, and to alter host routing tables?

IT Questions BankCategory: CCNA 3 v7Which attack is being used when threat actors use pings to discover subnets and hosts on a protected network, to generate flood attacks, and to alter host routing tables?

Which attack is being used when threat actors use pings to discover subnets and hosts on a protected network, to generate flood attacks, and to alter host routing tables?

  • Address Spoofing Attack
  • Amplification and Reflection Attacks
  • ICMP Attack
  • MiTM Attack
  • Session Hijacking

Explanation: In ICMP attacks, threat actors use pings to discover subnets and hosts on a protected network, to generate flood attacks, and to alter host routing tables.

Exam with this question: 3.6.7 Check Your Understanding - IP Vulnerabilities and Threats
Exam with this question: 16.2.6 Check Your Understanding - IP Vulnerabilities and Threats

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x