How is ICMP used as an exfiltration technique?
A) by flooding the destination host with unreachable packets
B) by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
C) by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
D) by overwhelming a targeted host with ICMP echo-request packets
Correct Answer:
Verified
Q198: What is a benefit of conducting device
Q199: An engineer needs a solution for TACACS+
Q200: A network engineer has been tasked with
Q201: Q202: Which two prevention techniques are used to Q204: An engineer has enabled LDAP accept queries Q205: An organization is trying to improve their Q206: What are two reasons for implementing a Q207: Which public cloud provider supports the Cisco Q208: How is ICMP used an exfiltration technique?![]()
A)
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents