Which ICMP technique queries the target for the time to obtain time information?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which ICMP technique queries the target for the time to obtain time information?

Explanation:
This question hinges on how ICMP can reveal the remote system’s clock. An ICMP timestamp ping sends a time stamp request to the target and the reply returns three values: the time the request originated, the time it was received, and the time the reply was sent. These timestamps come from the target’s clock, so you can determine clock offset and network delay. That makes this method the one designed specifically to obtain time information from the remote host. Other options measure reachability or general response behavior rather than clock data. An ICMP ECHO ping assesses round-trip time and connectivity but doesn’t provide the target’s time. IP protocol ping and TCP ACK ping are used for different probing purposes and don’t return time-of-day information from the target.

This question hinges on how ICMP can reveal the remote system’s clock. An ICMP timestamp ping sends a time stamp request to the target and the reply returns three values: the time the request originated, the time it was received, and the time the reply was sent. These timestamps come from the target’s clock, so you can determine clock offset and network delay. That makes this method the one designed specifically to obtain time information from the remote host.

Other options measure reachability or general response behavior rather than clock data. An ICMP ECHO ping assesses round-trip time and connectivity but doesn’t provide the target’s time. IP protocol ping and TCP ACK ping are used for different probing purposes and don’t return time-of-day information from the target.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy