Which tool can you use to detect and block malicious beaconing between a compromised host and a C2 server?
- Cisco Secure Firewall
- Cisco border router equipped with anomaly detection
- Splunk SIEM
- Cisco SASE appliance
Explanation & Hint:
To detect and block malicious beaconing between a compromised host and a Command-and-Control (C2) server, a “Cisco Secure Firewall” would be an effective tool. Cisco Secure Firewall (formerly known as Cisco ASA with FirePOWER Services) offers advanced threat protection capabilities, including the ability to detect and block malicious traffic. It can identify unusual patterns of communication, such as the regular, periodic traffic characteristic of beaconing to a C2 server. The firewall can be configured with security rules and threat intelligence to effectively block this type of malicious activity. The other tools mentioned also have relevant capabilities, but with different primary focuses:
|