Multiple Choice
How is ICMP used an exfiltration technique?
A) by flooding the destination host with unreachable packets
B) by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
C) by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
D) by overwhelming a targeted host with ICMP echo-request packets
Correct Answer:

Verified
Correct Answer:
Verified
Q41: The main function of northbound APIs in
Q42: Which Cisco security solution protects remote users
Q43: Which two activities can be done using
Q44: How does DNS Tunneling exfiltrate data?<br>A) An
Q45: Which two key and block sizes are
Q47: An engineer is configuring AMP for endpoints
Q48: In a PaaS model, which layer is
Q49: What is the function of the Context
Q50: In which type of attach does the
Q51: What is a prerequisite when integrating a