Which pair of ICMP messages is used in an inverse mapping attack?
A. Echo-Echo Request
B. Route Solicitation- Time Exceeded
C. Echo-Time Exceeded
D. Echo Reply-Host Unreachable
E. Echo-Host Unreachable
Which pair of ICMP messages is used in an inverse mapping attack?
A. Echo-Echo Request
B. Route Solicitation- Time Exceeded
C. Echo-Time Exceeded
D. Echo Reply-Host Unreachable
E. Echo-Host Unreachable