How is ICMP used an exfiltration technique?

How is ICMP used an exfiltration technique?
A . by flooding the destination host with unreachable packets
B . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
C . by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
D . by overwhelming a targeted host with ICMP echo-request packets

Answer: C

Latest 350-701 Dumps Valid Version with 327 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments