A security analyst is reviewing the data portion acquired from the following command:
tcpdump -lnvi icmp and src net 192.168.1.0/24 and dst net 0.0.0.0/0 -w output.pcap
The data portion of the packet capture shows the following:
The analyst suspects that a data exfiltration attack is occurring using a pattern in which the last five digits are encoding sensitive information. Which of the following technologies and associated rules should the analyst implement to stop this specific attack? (Choose two.)
wizwiz
Highly Voted 1 year, 5 months ago041ba31
Highly Voted 11 months ago3041b53
Most Recent 3 months, 1 week agoBright07
3 months, 1 week agoBright07
3 months, 1 week ago23169fd
9 months, 2 weeks agoMacherGaming
9 months, 2 weeks agosaucehozz
1 year agoMacherGaming
9 months, 2 weeks agogpt_test
1 year, 2 months agoarmid
9 months, 3 weeks agoElDirec
1 year, 2 months agotalosDevbot
1 year, 3 months agoPotato42
1 year, 4 months agoDelab202
1 year, 4 months agoOdinAtlasSteel
1 year, 4 months agoBadgerTester
1 year, 4 months agoOdinAtlasSteel
1 year, 4 months agoOdinAtlasSteel
1 year, 4 months agobiggytech
1 year, 5 months ago