GCIH Exam QuestionsBrowse all questions from this exam

GCIH Exam - Question 77


An attacker is tunneling TLS encrypted traffic within ICMP echo and reply packets. How will most network appliances see this?

Show Answer
Correct Answer: BC

When tunneling TLS encrypted traffic within ICMP echo and reply packets, most network appliances will see this as ping traffic. ICMP packets, such as echo request and echo reply, are used for the 'ping' function, and the traffic will appear to be ICMP rather than revealing the underlying covert TCP or TLS.

Discussion

2 comments
Sign in to comment
straleOption: C
Feb 27, 2024

Isn't C correct?

847ch0n3Option: C
Mar 2, 2024

it's a covert tcp traffic BUT network appliances will see this as a ping traffic.