ExamGecko
Question list
Search
Search

Question 114 - 350-701 discussion

Report
Export

How is ICMP used an exfiltration technique?

A.

by flooding the destination host with unreachable packets

Answers
A.

by flooding the destination host with unreachable packets

B.

by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address

Answers
B.

by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address

C.

by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host

Answers
C.

by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host

D.

by overwhelming a targeted host with ICMP echo-request packets

Answers
D.

by overwhelming a targeted host with ICMP echo-request packets

Suggested answer: C
asked 10/10/2024
David LeBlanc
21 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first