During a malware-driven distributed denial of service attack, a security researcher found excessive requests to a name server referring to the same domain name and host name encoded in hexadecimal. The malware author used which type of command and control?
During a malware-driven distributed denial of service attack, a security researcher found excessive requests to a name server referring to the same domain name and host name encoded in hexadecimal. The malware author used which type of command and control?
A . Internet Relay Chat (IRC)
B . Dnscat2
C . Custom channel
D . File Transfer Protocol (FTP)
Answer: D
Explanation:
Reference: https://www.csoonline.com/article/3276660/what-is-shodan-the-search-engine-for-everything-onthe-internet.html
Latest CFR-310 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments