What are the two ways threat actors use NTP? (Choose two.)
- They place an attachment inside an email message.
- They attack the NTP infrastructure in order to corrupt the information used to log the attack.
- They place iFrames on a frequently used corporate web page.
- They encode stolen data as the subdomain portion where the nameserver is under control of an attacker.
- Threat actors use NTP systems to direct DDoS attacks.
More Questions: CyberOps Associate Final Exam Answers