Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 1 Question 86 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 86
Topic #: 1
[All CFR-210 Questions]

A computer attacker has compromised a system by implanting a script that will send 10B packages over port 150. This port is also used for sending heartbeat messages to a central monitoring server. Which of the following BEST describes the tactic used to execute this attack?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Marcos
29 days ago
Haha, I bet the attacker is having a field day sending all those 'heartbeat' messages. Good thing I'm not the one monitoring that server!
upvoted 0 times
Carla
2 days ago
A) Covert channels
upvoted 0 times
...
...
Glennis
1 months ago
ICMP redirect? That's a bit too obvious for this kind of stealthy attack. I'd go with covert channels as the best answer.
upvoted 0 times
Beckie
3 days ago
I agree, covert channels would be the best choice for this kind of attack.
upvoted 0 times
...
...
Nancey
1 months ago
Backdoors definitely make sense here. The attacker has gained access and is using that to send malicious traffic, bypassing normal security measures.
upvoted 0 times
...
Zack
1 months ago
Logic bomb? I don't think so. This is more about abusing existing functionality than triggering a time-based event.
upvoted 0 times
...
Dalene
1 months ago
I think it could be covert channels, as they were able to send packages without detection.
upvoted 0 times
...
Kimi
2 months ago
I disagree, I believe they used backdoors to compromise the system.
upvoted 0 times
...
Gertude
2 months ago
I think the attacker used a logic bomb to execute this attack.
upvoted 0 times
...
Norah
2 months ago
Hmm, this sounds like a covert channel attack. Sending large volumes of traffic through a port used for legitimate purposes is a classic tactic to hide malicious activity.
upvoted 0 times
I think you're right, it does seem like a covert channel attack.
upvoted 0 times
...
Glendora
1 days ago
What about backdoors? Could the attacker have used that to gain unauthorized access to the system?
upvoted 0 times
...
Timothy
2 days ago
I see your point, but I still think covert channels make more sense in this scenario.
upvoted 0 times
...
Elenore
5 days ago
But couldn't it also be a logic bomb? The script is set to send a large number of packages at a specific time.
upvoted 0 times
...
Leota
1 months ago
I think you're right, it does seem like a covert channel attack.
upvoted 0 times
...
...

Save Cancel