Users report access to an application from an internal workstation is still unavailable to a specific server, even
after a recent firewall rule implementation that was requested for this access. ICMP traffic is successful
between the two devices. Which of the following tools should the security analyst use to help identify if the
traffic is being blocked?
A. nmap
B. tracert
C. ping
D. ssh
after a recent firewall rule implementation that was requested for this access. ICMP traffic is successful
between the two devices. Which of the following tools should the security analyst use to help identify if the
traffic is being blocked?
A. nmap
B. tracert
C. ping
D. ssh