How is ICMP used as an exfiltration technique?

How is ICMP used as an exfiltration technique?
A. by flooding the destination host with unreachable packets
B. by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
C. by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
D. by overwhelming a targeted host with ICMP echo-request packets

350-701: Implementing and Operating Cisco Security Core Technologies

Free dumps for 350-701 in PDF format.

High quality 350-701 PDF and software. VALID exam to help you pass.

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.