ECCouncil Related Exams
412-79v10 Exam
Which of the following policies helps secure data and protects the privacy of organizational information?
Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum.
Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.

Which of the following ICMP messages will be generated if the destination port is not reachable?
What is the maximum value of a “tinyint” field in most database systems?