Which method is used by some malware to transfer files from infected hosts to a threat actor host?

IT Questions BankCategory: CCNA CyberOpsWhich method is used by some malware to transfer files from infected hosts to a threat actor host?
Which method is used by some malware to transfer files from infected hosts to a threat actor host? 1IT Administrator Staff asked 10 months ago

Which method is used by some malware to transfer files from infected hosts to a threat actor host?

  • UDP infiltration
  • ICMP tunneling
  • HTTPS traffic encryption
  • iFrame injection

Explanation: ICMP traffic from inside the company is also a threat. Some varieties of malware use ICMP packets to transfer files from infected hosts to threat actors via ICMP tunneling.

More Questions: Modules 24 – 25: Protocols and Log Files Group Exam


Related Articles

guest
0 Comments
Inline Feedbacks
View all comments