Skip to main content

CS610 GDB No. 1 Spring 2020

 

CS610 GDB No. 1 Spring 2020 Due date 19-08-2020

GDB Topic

ICMP handles error and control messages and are very useful especially when an error occurs in WAN. ICMP messages are encapsulated and sent within IP datagrams while specific hosts and routers use ICMP to send reports of problems about the datagrams. There are several different types of ICMP messages depending on what the ICMP message is reporting. However, malicious users have found a way to turn a good network into an attack through which attacker attempts to disrupt a target machine causing the target machine to become inaccessible to normal traffic.



(A) In your opinion which type of attack from the following can become the cause of inaccessibility of the target machine? Justify your answer with sold reason in maximum five lines.

1: Ping of Flood

2: Ping of Death

(B) ICMP can also be used to test different tools. In your opinion, which are the 2 most common tools that use ICMP for basic management and troubleshooting on a network?



Instructions:

Please read the following instructions carefully before submitting the GDB:

A concise, coherent and to the point comment is preferred over lengthy comment having irrelevant details. Your comment must not be more than 4-5 lines.
Comments posted on MDB or sent through email will NOT be considered in any case.
You must post your answer on the Graded Discussion Board (GDB).
For any queries, please email at cs610@vu.edu.pk                


Solution :






#CS610 #GDB Idea from some one

According to my point of view the Ping of Death will cause of inaccessibility of the target machine. Because Ping of Death is a Denial of Service (DoS) attack in which no need of detailed knowledge of the machine intruder was attacking, except for its IP address. Ping of Death attacks were particularly effective because the attacker's identity could be easily spoofed. While in Ping of Flood attacker's need more bandwidth than victim and more knowledge about network.
(B) ICMP can also be used to test different tools. In your opinion, which are the 2 most common tools that use ICMP for basic management and troubleshooting on a network?
The ICMP used for the following most Common Test
1. TEST REACHABILITY (Specific Command Ping or Echo)
2. USING ICMP TEST TO TRACE A ROUTE (Specific Command Trace route or Tracert)

Comments

Popular posts from this blog

cs302 Solved Quiz

estion # 1 of 10 ( Start time: 03:03:55 PM )  Total Marks: 1    Divide-by-32 counter can be acheived by using   Select correct option:   Flip-Flop and DIV 10  Flip-Flop and DIV 16   Flip-Flop and DIV 32  DIV 16 and DIV 32 Question # 2 of 10 ( Start time: 03:05:20 PM )  Total Marks: 1   The counter states or the range of numbers of a counter is determined by the formula. (“n” represents the total number of flip-flops)   Select correct option:   (n raise to power 2)  (n raise to power 2 and then minus 1)  (2 raise to power n) (2 raise to power n and then minus 1) Question # 3 of 10 ( Start time: 03:06:36 PM )  Total Marks: 1   A 4- bit UP/DOWN counter is in DOWN mode and in the 1010 state. on the next clock pulse, to what state does the counter go?   Select correct option:   1001  1011  0011  1100 Question # 4 of 10 ( Start time: 03:07:37 PM )  Tot...

cs403 GDB Solution 2016

cs403 GDB 2016 For more discuss and ask question join this group   https://www.facebook.com/groups/143792885956764/ Posted By : Tahir Siddiqui(Mani)  Total Marks                                   5 Starting Date Wednesday, July 27, 2016 Closing Date Thursday, July 28, 2016 ...

MID TERM 2016 Spring Result Announced

Result has been Announced Check  ur lms Go LMS #MAni