A security analyst is reviewing the data portion acquired from the following command:
tcpdump -lnvi icmp and src net 192.168.1.0/24 and dst net 0.0.0.0/0 -w output.pcap
The data portion of the packet capture shows the following:
The analyst suspects that a data exfiltration attack is occurring using a pattern in which the last five digits are encoding sensitive information. Which of the following technologies and associated rules should the analyst implement to stop this specific attack? (Choose two.)
wizwiz
Highly Voted 1 year, 5 months ago041ba31
Highly Voted 11 months, 1 week ago3041b53
Most Recent 3 months, 2 weeks agoBright07
3 months, 2 weeks agoBright07
3 months, 2 weeks ago23169fd
9 months, 3 weeks agoMacherGaming
9 months, 3 weeks agosaucehozz
1 year agoMacherGaming
9 months, 3 weeks agogpt_test
1 year, 2 months agoarmid
10 months agoElDirec
1 year, 2 months agotalosDevbot
1 year, 3 months agoPotato42
1 year, 4 months agoDelab202
1 year, 4 months agoOdinAtlasSteel
1 year, 5 months agoBadgerTester
1 year, 5 months agoOdinAtlasSteel
1 year, 5 months agoOdinAtlasSteel
1 year, 5 months agobiggytech
1 year, 5 months ago