Question: QUESTION 1 ( a ) [ 8 Marks ] Consider the network depicted above. With reference to the TCP / IP network model, and using
QUESTION
a
Marks
Consider the network depicted above. With reference to the TCPIP network model,
and using bullet points, explain the steps involved in the creation of an ICMP echo
request ie a ping at and its transmission to Include in
your answer an outline of the role, if any, played by supporting protocols and routing
tables. Assume all ARP caches start empty and document any assumptions.
b
Marks
Consider the network depicted above. Explain how an attacker at
would go about intercepting all traffic between and the
network. Mention any relevant tools in your explanation.
c
Marks
Consider the network depicted above. With reference to the TCPIP network model,
and using bullet points, explain what happens when pings
note there is no device with the latter IP address Include in your
answer an outline of the role, if any, played by supporting protocols and routing
tables. Assume all ARP caches start empty and document any assumptions.
END OF QUESTION
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
