An analyst is alerted for a malicious file hash. After analysis, the analyst determined that an internal workstation is communicating over port 80 with an external server and that the file hash is associated with Duqu malware. Which tactics, techniques, and procedures align with this analysis? A. Command and Control, Application Layer Protocol, Duqu B. Discovery, Remote Services: SMB/Windows Admin Shares, Duqu C. Lateral Movement, Remote Services: SMB/Windows Admin Shares, Duqu D. Discovery, System Network Configuration Discovery, Duqu  Suggested Answer: A This question is in 350-201 Performing CyberOps Using Cisco Security Technologies (CBRCOR) Exam For getting Cisco Certified CyberOps Professional Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Cisco. Trademarks, certification & product names are used for reference only and belong to Cisco. The website does not contain actual questions and answers from Cisco's Certification Exam.
Please login or Register to submit your answer