Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HP Exam HPE6-A84 Topic 7 Question 34 Discussion

Actual exam question for HP's HPE6-A84 exam
Question #: 34
Topic #: 7
[All HPE6-A84 Questions]

What is a common characteristic of a beacon between a compromised device and a command and control server?

Show Suggested Answer Hide Answer
Suggested Answer: D

A beacon is a type of network traffic that is sent from a compromised device to a command and control (C2) server, which is a remote system that controls the malicious activities of the device . A beacon is used to establish and maintain communication between the device and the C2 server, as well as to receive instructions or exfiltrate data .

A common characteristic of a beacon is that it is periodic, meaning that it is sent at regular intervals, such as every few minutes or hours . This helps the C2 server to monitor the status and availability of the device, as well as to avoid detection by network security tools .

Another common characteristic of a beacon is that it is small and identically sized, meaning that it contains minimal or fixed amount of data, such as a simple acknowledgment or a random string . This helps the device to conserve bandwidth and resources, as well as to avoid detection by network security tools .


Contribute your Thoughts:

Dominque
27 days ago
D all the way. Those packets are like my social life - small and repetitive.
upvoted 0 times
...
Haydee
1 months ago
B, definitely. Who needs encryption when you're trying to get caught, right?
upvoted 0 times
...
Donette
1 months ago
I believe it's periodic transmission of small, identically sized packets. It helps in maintaining stealth and avoiding detection.
upvoted 0 times
...
Van
2 months ago
I agree with Karina, lack of encryption makes it easier for attackers to intercept the communication.
upvoted 0 times
...
Marya
2 months ago
D sounds legit. I bet those packets are as small as my attention span.
upvoted 0 times
Olive
28 days ago
Yeah, those small packets are hard to detect
upvoted 0 times
...
Karl
1 months ago
D) Periodic transmission of small, identically sized packets
upvoted 0 times
...
Daisy
1 months ago
B) Lack of encryption
upvoted 0 times
...
Kattie
1 months ago
A) Use of IPv6 addressing instead of IPv4 addressing
upvoted 0 times
...
...
Karina
2 months ago
I think the common characteristic is lack of encryption.
upvoted 0 times
...

Save Cancel