A computer attacker has compromised a system by implanting a script that will send 10B packages over port 150. This port is also used for sending heartbeat messages to a central monitoring server. Which of the following BEST describes the tactic used to execute this attack?
Marcos
29 days agoCarla
2 days agoGlennis
1 months agoBeckie
3 days agoNancey
1 months agoZack
1 months agoDalene
1 months agoKimi
2 months agoGertude
2 months agoNorah
2 months agoJennie
Glendora
1 days agoTimothy
2 days agoElenore
5 days agoLeota
1 months ago