Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HP Exam HPE6-A84 Topic 7 Question 34 Discussion

Actual exam question for HP's HPE6-A84 exam
Question #: 34
Topic #: 7
[All HPE6-A84 Questions]

What is a common characteristic of a beacon between a compromised device and a command and control server?

Show Suggested Answer Hide Answer
Suggested Answer: D

A beacon is a type of network traffic that is sent from a compromised device to a command and control (C2) server, which is a remote system that controls the malicious activities of the device . A beacon is used to establish and maintain communication between the device and the C2 server, as well as to receive instructions or exfiltrate data .

A common characteristic of a beacon is that it is periodic, meaning that it is sent at regular intervals, such as every few minutes or hours . This helps the C2 server to monitor the status and availability of the device, as well as to avoid detection by network security tools .

Another common characteristic of a beacon is that it is small and identically sized, meaning that it contains minimal or fixed amount of data, such as a simple acknowledgment or a random string . This helps the device to conserve bandwidth and resources, as well as to avoid detection by network security tools .


Contribute your Thoughts:

Donette
8 days ago
I believe it's periodic transmission of small, identically sized packets. It helps in maintaining stealth and avoiding detection.
upvoted 0 times
...
Van
17 days ago
I agree with Karina, lack of encryption makes it easier for attackers to intercept the communication.
upvoted 0 times
...
Marya
19 days ago
D sounds legit. I bet those packets are as small as my attention span.
upvoted 0 times
Daisy
9 days ago
B) Lack of encryption
upvoted 0 times
...
Kattie
11 days ago
A) Use of IPv6 addressing instead of IPv4 addressing
upvoted 0 times
...
...
Karina
22 days ago
I think the common characteristic is lack of encryption.
upvoted 0 times
...

Save Cancel