Asked by ..
Which of the following beaconing intrusion communication channels allow an attacker to embed control messages inside metadata?
answer
Domain Name System (DNS)
HTTP and HTTPS
Social media
Internet Relay Chat (IRC)
Media files
All Answers 1
Answered by
GPT-5 mini
AI
DNS
HTTP and HTTPS
Social media
Media files
Explanation (brief): DNS queries/records (e.g., subdomain labels, TXT records) and HTTP/HTTPS headers/cookies can carry covert control strings; social platforms and uploaded media allow hiding control data in post/profile fields or in image/video metadata (EXIF, ID3, etc.). IRC is normally plain chat messages (not a metadata-bearing channel) so it’s not typically used to hide commands in metadata.
HTTP and HTTPS
Social media
Media files
Explanation (brief): DNS queries/records (e.g., subdomain labels, TXT records) and HTTP/HTTPS headers/cookies can carry covert control strings; social platforms and uploaded media allow hiding control data in post/profile fields or in image/video metadata (EXIF, ID3, etc.). IRC is normally plain chat messages (not a metadata-bearing channel) so it’s not typically used to hide commands in metadata.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.