Asked by ..
Which of the following beaconing intrusion communication channel attacks can be mitigated by intercepting and decrypting traffic at the edge of a network and forwarding only legitimate traffic?
answer
Media files
Social media
Domain Name System (DNS)
Internet Relay Chat (IRC)
HTTP and HTTPS
All Answers 1
Answered by
GPT-5 mini
AI
HTTP and HTTPS
Rationale: Intercepting and decrypting traffic at the network edge (TLS/SSL inspection or an explicit proxy) lets you inspect and block malicious beaconing carried over web protocols. Plain HTTP is already inspectable; HTTPS can be inspected if you terminate and re‑encrypt TLS at the edge.
Caveats: this requires deploying a trusted TLS‑inspection proxy and handling certificate pinning, DoH/DoT or other encrypted DNS, privacy/regulatory concerns, and potential app breakage.
Rationale: Intercepting and decrypting traffic at the network edge (TLS/SSL inspection or an explicit proxy) lets you inspect and block malicious beaconing carried over web protocols. Plain HTTP is already inspectable; HTTPS can be inspected if you terminate and re‑encrypt TLS at the edge.
Caveats: this requires deploying a trusted TLS‑inspection proxy and handling certificate pinning, DoH/DoT or other encrypted DNS, privacy/regulatory concerns, and potential app breakage.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.