What are the two ways threat actors use NTP? (Choose two.)

IT Questions BankCategory: CCNA CyberOpsWhat are the two ways threat actors use NTP? (Choose two.)
What are the two ways threat actors use NTP? (Choose two.) 1ITExamAnswers Staff asked 9 months ago

What are the two ways threat actors use NTP? (Choose two.)

  • They place an attachment inside an email message.
  • They attack the NTP infrastructure in order to corrupt the information used to log the attack.
  • They place iFrames on a frequently used corporate web page.
  • They encode stolen data as the subdomain portion where the nameserver is under control of an attacker.
  • Threat actors use NTP systems to direct DDoS attacks.

More Questions: CyberOps Associate Final Exam Answers


Related Articles

guest
0 Comments
Inline Feedbacks
View all comments