• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which technique would a threat actor use to disguise traces of an ongoing exploit?

  • Use SSL to encapsulate malware.
  • Create an invisible iFrame on a web page.
  • Corrupt time information by attacking the NTP infrastructure.
  • Encapsulate other protocols within DNS to evade security measures.
Answers Explanation & Hints:

The Network Time Protocol (NTP) uses a hierarchy of time sources to provide a consistent time clock to network infrastructure devices. Threat actors may attack the NTP infrastructure in order to corrupt time information that is used in network logs.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 24 – 25: Protocols and Log Files Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments