Exam GCIH All QuestionsBrowse all questions from this exam
Question 77

An attacker is tunneling TLS encrypted traffic within ICMP echo and reply packets. How will most network appliances see this?

    Correct Answer: C

    When tunneling TLS encrypted traffic within ICMP echo and reply packets, most network appliances will see this as ping traffic. ICMP packets, such as echo request and echo reply, are used for the 'ping' function, and the traffic will appear to be ICMP rather than revealing the underlying covert TCP or TLS.

Discussion
straleOption: C

Isn't C correct?

847ch0n3Option: C

it's a covert tcp traffic BUT network appliances will see this as a ping traffic.