Question 63 of 76 from exam 350-201-CBRCOR: Performing CyberOps Using Cisco Security Technologies

Question 63 of 76 from exam 350-201-CBRCOR: Performing CyberOps Using Cisco Security Technologies

Question

ty
{

using (MemoryStream memoryStreat

new MemoryStream())

memoryStream Position = 32L;
using (AesCryptoServiceProvider aesCryptoServiceProvider = new AesCryptoServiceProvider())
{
aesCryptoServiceProvider.KeySize = 128;
aesCryptoServiceProvider BlockSize = 128;
aesCryptoServiceProvider Mode = CipherMode. CBC;
aesCryptoServiceProvider Padding = PaddingMode. PKCST;
aesCryptoServiceProvider Key = key;
aesCryptoServiceProvider GeneratelV();
using (CryptoStream cryptoSream = new CryptoStream(memoryStream, aesCryptoServiceProvider.CreateEncryptor(), CryptoStreamMode. Write))

memoryStream. Write(aesCryptoServiceProvider.IV, 0, aesCryptoServiceProvider.IV.Length);
cryptoStream.Write(input, 0, input.Length),

cryptoStream FlushFinalBlock();

using (HMACSHA256 hMACSH,
{

new HMACSHA256(bytes))

bytef] array = hMACSHA. ComputeHash(memoryStream.ToArray(), 32, memoryStream.ToArray().Length - 32);
memoryStream.Position = OL;
memoryStream,Write(array, 0, array Length);
)
)
)

result = memoryStream.ToArray();

Refer to the exhibit.

An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server.

What is the indicator of compromise?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.