Question

The Hans tool can be used to bypass firewalls by tunneling an IP connection over this protocol. This protocol’s “Fragmentation needed” messages are used to implement Path MTU Discovery, which is a big reason why networks shouldn’t filter out this protocol. In his “Harder Drive” project, Tom7 made a hard drive entirely contained (15[1])in this protocol, along (15[1])with a hard drive made (15[1])from NES Tetris games and another from used (15[1])COVID tests. The “Smurf” DDoS attack involves tricking a network into flooding a machine with this protocol. This protocol’s Time Exceeded and Destination Unreachable messages are used by (*) traceroute to map router hops. Unexpectedly large data is (10[1])sent through this protocol in an attack named for a certain kind of packet “of death”. For 10 points, what protocol’s Echo Request and Echo Reply messages are used by a ubiquitous networking utility to check if a host is reachable? ■END■

ANSWER: ICMP [accept answers describing the ping protocol; accept Internet Control Message Protocol]
<AW>
= Average correct buzz position
Conv. %Power %Average Buzz
100%80%68.80

Back to tossups

Buzzes

PlayerTeamOpponentBuzz PositionValue
Luke Van De WegheThefoo5215
Andrew SzetoI thought this was a Counter-Strike themed tournamentComputer Science: Going Outside5615
Arnav SoodCarnegie LemonsWhy does ACF have electrons do its work?6115
Michael DuI Paused My Unique Game to Be HereEventually Munches All Computer Storage6915
Kenny ZhangJAX guide -league -of -legends -lol -mortal -kombatA TV Guide for Netheads10610