• Post author:
  • Post category:Updated
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

What kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?

  • ICMP unreachable
  • ICMP mask reply
  • ICMP echo request
  • ICMP redirects
Explanation & Hint:

Common ICMP messages of interest to threat actors include the following:

ICMP echo request and echo reply: used to perform host verification and DoS attacks
ICMP unreachable: used to perform network reconnaissance and scanning attacks
ICMP mask reply: used to map an internal IP network
ICMP redirects: used to lure a target host into sending all traffic through a compromised device and create a man-in-the-middle attack
ICMP router discovery: used to inject bogus route entries into the routing table of a target host

For more Questions and Answers:

Cybersecurity Essentials 3.0 Checkpoint Exam: Network Security Module 1 – 6 Exam Answers Full 100%

CyberOps Associate 1.02 & CA v1.0 Modules 13 – 17: Threats and Attacks Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments