• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which method is used by some malware to transfer files from infected hosts to a threat actor host?

  • HTTPS traffic encryption
  • ICMP tunneling
  • iFrame injection
  • UDP infiltration
Answers Explanation & Hints:

ICMP traffic from inside the company is also a threat. Some varieties of malware use ICMP packets to transfer files from infected hosts to threat actors via ICMP tunneling.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 24 – 25: Protocols and Log Files Group Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments