Explain why blocking ping icmp echo request packets at an


Part 1: Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping flood attacks where the attacker is trying to consume bandwidth. Describe an effective defense against such an attack. Your answer must have enough detail to show that you understand the concept.

Part 2: Network address translation (NAT) protects against unsolicited incoming packets, but not against other types other types of network activity, such as "drive-by downloads." Explain how NAT protects against unsolicited incoming packets. Explain why NAT does not protect against other types of attacks.

Part 3: Suppose you've found a USB drive in a classroom. It's not safe just to plug in the drive and see what happens. Which of the malicious software propagation techniques described in chapter 6 could use a USB drive for transport? What steps could you take to safely determine the contents of the drive?

Part 4: You download a free solitaire card game for your phone. It's a "play by yourself" game that doesn't interact with other players, etc. When you start to install it, you find that it wants permission to "Send SMS messages," and "Access your address book." What is likely going on? What would a malicious person have to gain by doing this?

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Explain why blocking ping icmp echo request packets at an
Reference No:- TGS02882106

Expected delivery within 24 Hours