CNIT 344: Network Support & Control Protocols

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

What RFC defines ICMP?

RFC 792

2
New cards

What does ICMP provide to network operations?

Feedback messages about delivery and network issues

3
New cards

Is ICMP required for IP?

Yes

4
New cards

What does the RFC state about ICMP messages?

Messages should be created for control events and should be honored by receiving devices

5
New cards

Can broadcast or multicast messages create ICMP messages?

No, they can’t generate ICMP messages

6
New cards

What happens if an ICMP message encounters an error?

It cannot generate another ICMP error message (to prevent loops).

7
New cards

What does the “type” field define in an ICMP message?

The message format and general action

8
New cards

What does the “code” field define in an ICMP message?

Specific operational actions within a message type

9
New cards

What does the “checksum” field define in an ICMP message?

Error checking using a one’s complement sum of 16-bit sections

10
New cards

What determines each ICMP code?

It depends on the type it’s associated with

11
New cards

What do types with only one code use for the code value?

0

12
New cards

What two ICMP message types does ping use?

Type 8 and 0

13
New cards

What is the function of the echo request?

Sent by the source to test network reachability

14
New cards

What is the function of the echo reply?

Returned by the destination to confirm connectivity

15
New cards

What is the purpose of traceroute?

To determine the path a packet takes to a destination

16
New cards

How does traceroute work?

It records each hop by returning ICMP messages from intermediate routers

17
New cards

Why are ICMP unreachable messages generated?

Due to routing errors, dropped packets, or delivery issues.

18
New cards

How are different unreachable causes classified?

Each reason (no route, drop rule, delivery error) is distinct.

19
New cards

What do these messages indicate?

Failed delivery of a packet between devices.

20
New cards

Is ICMP secure?

No, it’s inherently insecure by design.

21
New cards

What are three common ICMP-based attacks?

Ping of Death, Smurf Attack, ICMP Sweep.

22
New cards

What makes ICMP vulnerable?

It can be exploited for amplification, scanning, or denial-of-service.

23
New cards

What should be blocked on external interfaces for security?

Incoming Echo Requests and Traceroute messages.

24
New cards

What messages should be rate-limited or blocked internally?

Outgoing Echo Requests and Destination Host Unknown messages.

25
New cards

How can ICMP-based OS fingerprinting be mitigated?

By using IDS/IPS systems and filtering Protocol/Port Unreachable messages.