Which method is used by some malware to transfer files from infected hosts to a threat actor host?
- UDP infiltration
- ICMP tunneling
- HTTPS traffic encryption
- iFrame injection
Explanation: ICMP traffic from inside the company is also a threat. Some varieties of malware use ICMP packets to transfer files from infected hosts to threat actors via ICMP tunneling.
Exam with this question: Modules 24 - 25: Protocols and Log Files Group Exam
Exam with this question: Checkpoint Exam: Evaluating Security Alerts Answers
Please login or Register to submit your answer