During a malware-driven distributed denial of service attack, a security researcher found excessive requests to a name server referring to the same domain name and host name encoded in hexadecimal. The malware author used which type of command and control?

During a malware-driven distributed denial of service attack, a security researcher found excessive requests to a name server referring to the same domain name and host name encoded in hexadecimal. The malware author used which type of command and control?
A . Internet Relay Chat (IRC)
B . Dnscat2
C . Custom channel
D . File Transfer Protocol (FTP)

Answer: D

Explanation:

Reference: https://www.csoonline.com/article/3276660/what-is-shodan-the-search-engine-for-everything-on­the-internet.html

Latest CFR-310 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments