Notifications
Clear all
Topic starter
A security analyst is reviewing the following DNS logs as part of security-monitoring activities:
Which of the following MOST likely occurred?
- A . The attack used an algorithm to generate command and control information dynamically.
B. The attack used encryption to obfuscate the payload and bypass detection by an IDS.
C. The attack caused an internal host to connect to a command and control server.
D. The attack attempted to contact www.gooqle com to verify Internet connectivity.
Suggested Answer: C
Posted : 02/11/2022 11:03 am