This is a tricky one. The random connections to the attacker's server make me think it could be a honeypot, but the data exfiltration part doesn't quite fit. I'm a bit confused on the best way to approach this, so I'll review my notes and try to eliminate the options that don't seem to match the scenario.
Hmm, I'm a bit unsure about this one. The device is initiating random connections to an attacker's server, but I'm not sure which specific attack type that corresponds to. I'll have to think it through carefully.
Okay, let's see. The key details are that the IoT device is initiating connections to exfiltrate data, so it's likely some kind of remote access or data theft attack. I'm leaning towards either a man-in-the-middle or reverse shell, but I'll double-check the options to be sure.
I've got this one! The answer is D, carrier aggregation for 5G cells. In an Option 2 deployment, which is a 5G network, carrier aggregation is the most effective way to increase capacity by combining multiple 5G carriers. The other options, while valid in some scenarios, aren't as well-suited for this specific deployment.
Hubert
5 months agoTawny
5 months agoGeraldine
5 months agoNorah
6 months agoJeanice
6 months agoFreeman
6 months agoMyra
6 months agoLyda
6 months agoHannah
6 months agoShawnda
6 months agoJosue
6 months agoCrista
7 months agoCasie
7 months agoAretha
7 months agoCarri
7 months agoFrankie
11 months agoKassandra
11 months agoPamela
10 months agoFranchesca
10 months agoCristina
11 months agoBillye
12 months agoCyril
12 months agoDanica
10 months agoElinore
10 months agoKeneth
11 months agoFreida
1 year agoNina
10 months agoAleisha
11 months agoHillary
11 months agoMindy
11 months agoMeaghan
1 year agoJunita
1 year agoMeaghan
1 year ago