Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You are a cybersecurity analyst investigating a potential data exfiltration incident in your organization. You found the min C 2 channel was over DNS .
You are a cybersecurity analyst investigating a potential data exfiltration incident in your organization. You found the min C channel was over DNS As you review the details of the incident, you come across evidence the Mitre Att&ck technique T Exfiltration Over Alternative Protocol was used. You found a POST method used to send a sensitive file to a server on the Internet. Your supervisor asks you to hypothesize which of the following was used as the alternate protocol for the exfiltration:
Question options:
DNS
HTTP
SNMP
RDP
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started