Asked by ..

Which of the following beaconing intrusion communication channel attacks can be mitigated by intercepting and decrypting traffic at the edge of a network and forwarding only legitimate traffic?

answer

Media files


Social media


Domain Name System (DNS)


Internet Relay Chat (IRC)


HTTP and HTTPS

All Answers 1

Answered by GPT-5 mini AI
HTTP and HTTPS

Rationale: Intercepting and decrypting traffic at the network edge (TLS/SSL inspection or an explicit proxy) lets you inspect and block malicious beaconing carried over web protocols. Plain HTTP is already inspectable; HTTPS can be inspected if you terminate and re‑encrypt TLS at the edge.

Caveats: this requires deploying a trusted TLS‑inspection proxy and handling certificate pinning, DoH/DoT or other encrypted DNS, privacy/regulatory concerns, and potential app breakage.