How ICMP is used in ping and traceroute facilities
Answers were Sorted based on User's Feedback
Internet Control Message Protocol (ICMP) pings and
traceroute on the PIX Firewall are handled differently
based on the version of PIX and ASA code.
Inbound ICMP through the PIX/ASA is denied by default.
Outbound ICMP is permitted, but the incoming reply is
denied by default.
** ASA/PIX does not support ICMP redirects, because it does
not support asymmetric routing
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / sachin
it is used in finding out the error message like if data
gram is not reaching to the destination.It is reliable
protocol as compared to Internet protocol.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / hasan
ICMP works on
echo-request n echo-reply
in network communications devices echo-request/reply's open
open in network security devices echo-request/reply is
close as inbound traffic is restricted by default.
so by this process of echo-request n echo-reply the PING
and traceroute works and gives the information that the
channel is established.
| Is This Answer Correct ? | 0 Yes | 0 No |
What is the juncture at which the CPE ends and the local loop portion of the service begins? A. Demarc B. CO C. Local loop D. Last-mile
Which statement about an IP network is true? A. A broadcast source MAC address contains all zeros B. A MAC address is part of the physical layer of the OSI model C. MAC addresses are used by bridges to make forwarding decisions. IP address are used by routers. D. IP addresses allow a flat addressing scheme. MAC addresses use a hierarchical addressing scheme.
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP
Which layer is responsible for synchronizing sending and receiving applications? A.) Presentation B.) Session C.) Transport D.) Application E.) Network
You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 Answers Intel, Quark, Wipro,
What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops
Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) ROM D.) Console E.) Trace
What are the different types of network in ccna?
Which configuration mode and command combination sets the bandwidth metric of a Frame Relay connection? A. router(config)# clock rate 56 B. router(config)# bandwidth 56 C. router(config)# bandwidth 56000 D. router(config)# clock rate 56000
What is trigger rip and from which ios version it starts?
How many types of ospf configuration?