Skip to main content

UNABLE TO PING?

If you are unable to ping a remote machine, there are several possible causes:
  1. If you are trying to ping a host name, make sure the name you are pinging is fully qualified.
  2. If pinging the fully qualified host name does not work, try pinging the IP address of the destination machine. If ping fails when you try the name of the site, but works when you try the IP address, it's NOT a network problem, it's a problem with DNS.
  3. If you are trying to ping a site and both the name and the IP address fail, they may be administratively denied by an access control list. Cisco routers report !A when they are blocking ping with an access list. Try a traceroute instead, or if it is a website, try browsing it.
  4. If the traceroute you performed shows multiple hops between you and the destination, then try pinging each host in the path starting closest to you and working your way towards the destination until you find the host that fails to respond to ping. Use a traceroute (successfully) to get a list of the hosts between you and the destination for this purpose.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...