{"id":3607,"date":"2023-12-03T18:54:57","date_gmt":"2023-12-03T18:54:57","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question381\/"},"modified":"2023-12-03T18:54:57","modified_gmt":"2023-12-03T18:54:57","slug":"comptia-security-sy0-601-question381","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question381\/","title":{"rendered":"CompTIA Security+ SY0-601 &#8211; Question381"},"content":{"rendered":"<div class=\"question\">Users report access to an application from an internal workstation is still unavailable to a specific server, even<br \/>\nafter a recent firewall rule implementation that was requested for this access. ICMP traffic is successful<br \/>\nbetween the two devices. Which of the following tools should the security analyst use to help identify if the<br \/>\ntraffic is being blocked?<br \/>\n<br \/><strong><br \/>A.<\/strong> nmap<br \/><strong>B.<\/strong> tracert<br \/><strong>C.<\/strong> ping<br \/><strong>D.<\/strong> ssh<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>B<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nReference: <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/how-to-use-tracert-to-troubleshoot-tcp-ip-problems-in-\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/support.microsoft.com\/en-us\/topic\/how-to-use-tracert-to-tro&#8230;<\/a><br \/>\nwindows-e643d72b-2f4f-cdd6-09a0-fd2989c7ca8e#:~:text=TRACERT%20is%20useful%20for%<br \/>\n20troubleshooting,routers%20or%20bridges)%20are%20involved<\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Users report access to an application from an internal workstation is still unavailable to a specific server, even after a recent firewall rule implementation that was requested for this access. ICMP traffic is successful between the two devices. Which of the following tools should the security analyst use to help identify if the traffic is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,384],"class_list":["post-3607","post","type-post","status-publish","format-standard","hentry","category-comptia-security-sy0-601","tag-comptia-security-sy0-601","tag-question-381"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/comments?post=3607"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3607\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/media?parent=3607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/categories?post=3607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/tags?post=3607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}