Q: 8
A computer attacker has compromised a system by implanting a script that will send 10B packages
over port 150. This port is also used for sending heartbeat messages to a central monitoring server.
Which of the following BEST describes the tactic used to execute this attack?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.