Which method is used by some malware to transfer files from infected hosts to a threat actor host?

IT Questions BankCategory: CCNA CyberOpsWhich method is used by some malware to transfer files from infected hosts to a threat actor host?

Which method is used by some malware to transfer files from infected hosts to a threat actor host?

  • UDP infiltration
  • ICMP tunneling
  • HTTPS traffic encryption
  • iFrame injection

Explanation: ICMP traffic from inside the company is also a threat. Some varieties of malware use ICMP packets to transfer files from infected hosts to threat actors via ICMP tunneling.

Exam with this question: Modules 24 - 25: Protocols and Log Files Group Exam
Exam with this question: Checkpoint Exam: Evaluating Security Alerts Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments