A computer attacker has compromised a system by implanting a script that will send 10B packages over port 150. This port is also used for sending heartbeat messages to a central monitoring server. Which of the following BEST describes the tactic used to execute this attack?
Marcos
2 months agoTijuana
1 months agoTheresia
1 months agoCarla
2 months agoGlennis
3 months agoWhitley
1 months agoKindra
1 months agoBeckie
2 months agoNancey
3 months agoZack
3 months agoDalene
3 months agoKimi
3 months agoGertude
3 months agoNorah
3 months agoFlorinda
1 months agoRochell
1 months agoArmando
1 months agoJennie
2 months agoGlendora
2 months agoTimothy
2 months agoElenore
2 months agoLeota
3 months ago