What are the two ways threat actors use NTP? (Choose two.)
- Threat actors use NTP systems to direct DDoS attacks.
- They place iFrames on a frequently used corporate web page.
- They encode stolen data as the subdomain portion where the nameserver is under control of an attacker.
- They place an attachment inside an email message.
- They attack the NTP infrastructure in order to corrupt the information used to log the attack.
Explanation & Hint:
Network Time Protocol (NTP) can be exploited by threat actors in a few ways, primarily due to its ability to respond to requests with significantly more data than is contained within the request. Two ways that threat actors use NTP are:
The other options listed, such as placing iFrames on a web page, encoding stolen data in DNS queries, and sending malicious email attachments, do not directly involve the abuse of the NTP protocol. Those are separate attack methods not specifically related to NTP exploitation. |