ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 339 - CS0-003 discussion

Report
Export

A systems administrator is reviewing after-hours traffic flows from data center servers and sees regular, outgoing HTTPS connections from one of the servers to a public IP address. The server should not be making outgoing connections after hours. Looking closer, the administrator sees this traffic pattern around the clock during work hours as well. Which of the following is the most likely explanation?

A.

Command-and-control beaconing activity

Answers
A.

Command-and-control beaconing activity

B.

Data exfiltration

Answers
B.

Data exfiltration

C.

Anomalous activity on unexpected ports

Answers
C.

Anomalous activity on unexpected ports

D.

Network host IP address scanning

Answers
D.

Network host IP address scanning

E.

A rogue network device

Answers
E.

A rogue network device

Suggested answer: A

Explanation:

Command-and-control (C2) beaconing involves compromised systems communicating with an attacker's server at regular intervals, often using HTTPS to blend in with legitimate traffic. This is indicative of a potential compromise where malware communicates back to a command center. The persistent nature of the connections after hours and throughout the day suggests automated beaconing, which is a tell-tale sign of C2 activity. According to CompTIA CySA+, this type of activity should raise immediate suspicion and warrants further investigation and containment. While options B, C, D, and E might indicate other issues, they do not fit the pattern described as well as option A.

asked 17/10/2024
Fabio Valenti
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first