ICMP Echo Reply Packets

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Background: Carl is a Security Administrator for a company. While monitoring the IDS, he notices that there has been a surge in ICMP Echo Reply packets received on the interface of the external gateway. On closer inspection, Carl discovers that the ICMP Echo Reply packets are originating from the Internet with no request from the internal host.

Q: What attack has most likely taken place on the company’s network?

a. Land attack

b. DoS attack

c. Smurf attack

d. Fraggle attack

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?