Appendix C. Memory Tables Answer Key

Chapter 2

Image

Table 2-3 IPv4 Addressing

Image

Table 2-5 ICMP Types and Codes

Image

Table 2-6 Some Common Type 3 Codes

Image

Table 2-8 Layers and Responsibilities

Chapter 3

Image

Table 3-5 Common Ports and Protocols

Table 3-7 The Seven ...

Get Certified Ethical Hacker (CEH) Cert Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.