1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
at which layer does Internet Control Message Protocol (ICMP) operate in?
Network Layer
What are some key points with Internet Control Message Protocol (ICMP)
Not used for data transmission between systems like TCP and UDP, provides error messaging and diagnostic functions, supports functionalities like ping and traceroute.
This is used for indicating host or service unreachability, expired time to live, and router buffer issues
ICMP error messages
This utility is used to test host reachability on an IP Network and measures roundtrip time latency for network connection
Ping utility
What does an Internet Control Message Protocol (ICMP) message structure consists of?
The type, which indicates the type of ICMP message (1 byte), the code which provides additional context about the message type (1 byte), and the checksum, used for error checking the message header and data (2 bytes)
what type of attacks can be used with Internet Control Message Protocol (ICMP)
ICMP Flood Attack, Ping of Death
This attack overwhelms a target with echo request packets that lead to a Denial of Service (DoS) attack. Which is amplified up to Distributed Denial of Service (DDoS) attack to be effective
ICMP Flood Attack
This attack exploits vulnerabilities in older systems cause system crashes
Ping of Death
What are some modern security measures
Network administrators can choose to block the ICMP traffic