The PING program is used to test whether another host is reachable . PING sends an Internet Control Message Protocol (ICMP) echo request message to a host, expecting an ICMP echo reply to be returned. PING measures the round-trip time of the message exchange and monitors any packet loss across network paths.
Caution | PING (Packet Internet Groper). The name of a program used in the Internet to test reachability of destinations by sending them an ICMP echo request and wait-ing for a reply. The term has survived the original program and is now used like a verb as in, " please ping host A to see if it is alive ." |
RISK PING is a reporting program only and does not pose any security risks unless a virus or Trojan horse creates a "ping of death" issue.
BP-FILE-PING-01 PING should be secured "UUNU".
BP-OPSYS-LICENSE-01 PING must be LICENSED.
BP-OPSYS-OWNER-01 PING should be owned by SUPER.SUPER.
BP-OPSYS-FILELOC-01 PING must reside in $SYSTEM.SYSnn
Discovery Questions | Look here: | |
---|---|---|
FILE-POLICY | Is PINGing allowed from this system? | Policy |
OPSYS-OWNER-01 | Who owns the PING object file? | Fileinfo |
OPSYS-LICENSE-01 | Is the PING object file licensed? | Fileinfo |
FILE-PING-01 | Is the PING object file secured correctly? | Fileinfo |
Related Topics
TCP/IP