A security engineer has been hired to design a device that will enable the exfiltration of data from within a well-defended network perimeter during an authorized test. The device must bypass all firewalls and NIDS in place, as well as allow for the upload of commands from a centralized command and control server . The total cost of the device must be kept to a minimum in case the device is discovered during an assessment. Which of the following tools should the engineer load onto the device being designed?
A) Custom firmware with rotating key generation
B) Automatic MITM proxy
C) TCP beacon broadcast software
D) Reverse shell endpoint listener
Correct Answer:
Verified
Q83: The government is concerned with remote military
Q84: A security consultant is improving the physical
Q85: During the deployment of a new system,
Q86: A large company with a very complex
Q87: A user asks a security practitioner for
Q89: An organization has recently deployed an EDR
Q90: In the past, the risk committee at
Q91: Users have been reporting unusual automated phone
Q92: An engineer needs to provide access to
Q93: Ann, a terminated employee, left personal photos
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents