A security engineer has been hired to design a device that will enable the exfiltration of data from within a well-defended network perimeter during an authorized test. The device must bypass all firewalls and NIDS in place, as well as allow for the upload of commands from a centralized command and control answer. The total cost of the device must be kept to a minimum in case the device is discovered during an assessment .
Which of the following tools should the engineer load onto the device being designed?
A . Custom firmware with rotating key generation
B . Automatic MITM proxy
C . TCP beacon broadcast software
D . Reverse shell endpoint listener
Answer: B
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund