Multiple Choice
How is ICMP used as an exfiltration technique?
A) by flooding the destination host with unreachable packets
B) by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
C) by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
D) by overwhelming a targeted host with ICMP echo-request packets
Correct Answer:

Verified
Correct Answer:
Verified
Q100: What are two reasons for implementing a
Q101: Which suspicious pattern enables the Cisco Tetration
Q102: What is the Cisco API-based broker that
Q103: An attacker needs to perform reconnaissance on
Q104: Which two aspects of the cloud PaaS
Q106: An engineer used a posture check on
Q107: What is a language format designed to
Q108: Why would a user choose an on-premises
Q109: What is the purpose of the My
Q110: A network engineer has been tasked with