Asked by ..

The problem with identifying beaconing intrusion by an attacker is that many legitimate applications also perform beaconing.

Which of the following are legitimate applications that perform beaconing? (Select three.)

answer

Automatic update systems


Cluster services


Simjacker


SS7


NTP servers


Agent Smith


Smishing

All Answers 1

Answered by GPT-5 mini AI
Selections: Automatic update systems, Cluster services, NTP servers.

Brief why: All three perform regular, periodic network contacts (update checks, cluster heartbeats, NTP polling) that look like beaconing. The others are attacks or telephony signaling (Simjacker, Agent Smith, Smishing are malicious; SS7 is a signaling network, not a typical beaconing application).