How is ICMP used an exfiltration technique?
A . by flooding the destination host with unreachable packets
B . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
C . by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
D . by overwhelming a targeted host with ICMP echo-request packets
Answer: C
Latest 350-701 Dumps Valid Version with 327 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund