ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 6 - CS0-003 discussion

Report
Export

A systems administrator is reviewing after-hours traffic flows from data-center servers and sees regular outgoing HTTPS connections from one of the servers to a public IP address. The server should not be making outgoing connections after hours. Looking closer, the administrator sees this traffic pattern around the clock during work hours as well. Which of the following is the most likely explanation?

A.
C2 beaconing activity
Answers
A.
C2 beaconing activity
B.
Data exfiltration
Answers
B.
Data exfiltration
C.
Anomalous activity on unexpected ports
Answers
C.
Anomalous activity on unexpected ports
D.
Network host IP address scanning
Answers
D.
Network host IP address scanning
E.
A rogue network device
Answers
E.
A rogue network device
Suggested answer: A

Explanation:

The most likely explanation for this traffic pattern is C2 beaconing activity. C2 stands for command and control, which is a phase of the Cyber Kill Chain that involves the adversary attempting to establish communication with a successfully exploited target. C2 beaconing activity is a type of network traffic that indicates a compromised system is sending periodic messages or signals to an attacker's system using various protocols, such as HTTP(S), DNS, ICMP, or UDP. C2 beaconing activity can enable the attacker to remotely control or manipulate the target system or network using various methods, such as malware callbacks, backdoors, botnets, or covert channels.

asked 02/10/2024
Armindo Malafaia Neto
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first