How is ICMP used an...
 
Notifications
Clear all

How is ICMP used an exfiltration technique?

1 Posts
1 Users
0 Likes
727 Views
(@mccroygalen)
Noble Member
Joined: 2 years ago
Posts: 739
Topic starter  

How is ICMP used an exfiltration technique?

  • A . by flooding the destination host with unreachable packets
  • B . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
  • C . by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
  • D . by overwhelming a targeted host with ICMP echo-request packets

Show Answer Hide Answer

Suggested Answer: C

   
Quote
Topic Tags

Latest 350-701 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: