Melissa uses the ping utility to check whether a remote system is up as part of a penetration testing exercise. If she does not want to see her own ping packets, what protocol should she filter out from her packet sniffer’s logs?
A、UDP
B、TCP
C、IP
D、ICMP
发布时间:2025-08-18 23:23:35