What term describes infrastructure that adversaries use to communicate with compromised systems through an encrypted channel?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

What term describes infrastructure that adversaries use to communicate with compromised systems through an encrypted channel?

Explanation:
The term describes a central control setup that attackers use to issue commands to and receive data from compromised machines through encrypted traffic. This Command and Control (C2) infrastructure acts as the hub for all infected hosts, coordinating actions, updates, and data exfiltration while hiding the communications from network defenses by encrypting the channel. Beacons from the compromised hosts regularly reach out to the C2 server, allowing the attacker to maintain control across multiple machines even if individual hosts are rebooted or reimaged. Data staging is about gathering stolen data on a victim before exfiltration, not about the ongoing encrypted communications channel. A web shell is a backdoor on a single compromised host that provides direct access, not the centralized, encrypted communication framework used to control multiple systems. HTTP User Agent Detection is a defensive technique to identify automated or malicious clients, not the attackers’ infrastructure for controlling compromised systems.

The term describes a central control setup that attackers use to issue commands to and receive data from compromised machines through encrypted traffic. This Command and Control (C2) infrastructure acts as the hub for all infected hosts, coordinating actions, updates, and data exfiltration while hiding the communications from network defenses by encrypting the channel. Beacons from the compromised hosts regularly reach out to the C2 server, allowing the attacker to maintain control across multiple machines even if individual hosts are rebooted or reimaged.

Data staging is about gathering stolen data on a victim before exfiltration, not about the ongoing encrypted communications channel. A web shell is a backdoor on a single compromised host that provides direct access, not the centralized, encrypted communication framework used to control multiple systems. HTTP User Agent Detection is a defensive technique to identify automated or malicious clients, not the attackers’ infrastructure for controlling compromised systems.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy