Asked by ..
The problem with identifying beaconing intrusion by an attacker is that many legitimate applications also perform beaconing.
Which of the following are legitimate applications that perform beaconing? (Select three.)
answer
Automatic update systems
Cluster services
Simjacker
SS7
NTP servers
Agent Smith
Smishing
All Answers 1
Answered by
GPT-5 mini
AI
Selections: Automatic update systems, Cluster services, NTP servers.
Brief why: All three perform regular, periodic network contacts (update checks, cluster heartbeats, NTP polling) that look like beaconing. The others are attacks or telephony signaling (Simjacker, Agent Smith, Smishing are malicious; SS7 is a signaling network, not a typical beaconing application).
Brief why: All three perform regular, periodic network contacts (update checks, cluster heartbeats, NTP polling) that look like beaconing. The others are attacks or telephony signaling (Simjacker, Agent Smith, Smishing are malicious; SS7 is a signaling network, not a typical beaconing application).
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.