How is ICMP used an exfiltration technique?
A) by flooding the destination host with unreachable packets
B) by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
C) by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
D) by overwhelming a targeted host with ICMP echo-request packets
Correct Answer:
Verified
Q203: How is ICMP used as an exfiltration
Q204: An engineer has enabled LDAP accept queries
Q205: An organization is trying to improve their
Q206: What are two reasons for implementing a
Q207: Which public cloud provider supports the Cisco
Q209: What are two list types within AMP
Q210: Which Cisco command enables authentication, authorization, and
Q211: In which two ways does a system
Q212: What is managed by Cisco Security Manager?
A)
Q213: What is a commonality between DMVPN and
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents