How is ICMP used as an exfiltration technique?
A) by flooding the destination host with unreachable packets
B) by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
C) by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
D) by overwhelming a targeted host with ICMP echo-request packets
Correct Answer:
Verified
Q198: What is a benefit of conducting device
Q199: An engineer needs a solution for TACACS+
Q200: A network engineer has been tasked with
Q201: Q202: Which two prevention techniques are used to Q204: An engineer has enabled LDAP accept queries Q205: An organization is trying to improve their Q206: What are two reasons for implementing a Q207: Which public cloud provider supports the Cisco Q208: How is ICMP used an exfiltration technique?
A)
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents