Computers that communicate with a command and control server are commonly known as botsor zombies. A collection of bots communicating with the same command and control server andunder the control of the same person or group is known as a botnet.Ines is reviewing the network traffic logs and sees what appears to be beaconing. Which of thefollowing best describes the traffic she has noticed?a. The traffic is most likely being sent to a command and control server.b. Beacons are another name for DNS queries, which is a normal type of traffic on the network.c. The traffic is most likely internal communications between malware-infected computers.d. This is normal network traffic that is sent between routers and switches on the network.a.The traffic is most likely being sent to a command and control server.loideBeaconing describes malware-infected devices checking in with a command and controlserver to determine whether there is anything they need to do.
Jaden has received an alert from a system that has identified potential malware on itself. Uponlooking through the log files, he sees a list of error messages where an executable tried to writedata to a range of memory addresses that did not exist for the system. Which of the following hasmost likely occurred?
Suki wants to analyze all of the traffic being sent to and from a group of 10 computers that are allconnected to the same networking device. He decides to install a sniffing device that will capturepackets and then enable port mirroring on the networking device to send copies of the traffic tothe sniffing device. Which of the following networking devices is he most likely using?