mediummultiple choiceObjective-mapped

A security analyst is reviewing network flow logs and notices a series of outbound connections from a single internal workstation to an external IP address on TCP port 443. The connections occur every 5 minutes, each lasting about 2 seconds, and the amount of data transferred per connection is consistently around 1 KB. The workstation's user reports no unusual activity. The analyst checks the host's EDR logs and sees no malicious processes or known indicators. Which type of activity is this pattern most consistent with?

Question 1mediummultiple choice
Full question →

A security analyst is reviewing network flow logs and notices a series of outbound connections from a single internal workstation to an external IP address on TCP port 443. The connections occur every 5 minutes, each lasting about 2 seconds, and the amount of data transferred per connection is consistently around 1 KB. The workstation's user reports no unusual activity. The analyst checks the host's EDR logs and sees no malicious processes or known indicators. Which type of activity is this pattern most consistent with?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Beaconing to a command-and-control server

Correct. Beaconing is characterized by regular, periodic connections with small data transfers, used by malware to maintain a persistent command-and-control channel. The fixed 5-minute interval and ~1 KB payload strongly match this pattern.

B

Distractor review

Normal software update check

Incorrect. While some software updates use periodic checks, they usually occur at less regular intervals, often with randomized delays to avoid server load, and the data transferred is typically larger (e.g., update manifests or actual patches). The extremely consistent timing and small size are more indicative of beaconing.

C

Distractor review

DNS tunneling

Incorrect. DNS tunneling exfiltrates data by encoding it in DNS queries, which use UDP port 53 (or sometimes TCP port 53). The traffic described is over TCP port 443 (HTTPS), not DNS, so this pattern does not match DNS tunneling.

D

Distractor review

Data exfiltration via HTTPS

Incorrect. Data exfiltration via HTTPS typically involves transferring larger volumes of data in a single session or over a shorter period. The steady 1 KB every 5 minutes would take an extremely long time to exfiltrate significant data, making this pattern unlikely for exfiltration. Beaconing is far more probable.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Beaconing to a command-and-control server — The observed pattern of small, periodic outbound connections over HTTPS to a single external IP is a classic indicator of beaconing. Beaconing is a communication technique used by malware to establish a command-and-control channel. The malware sends a small 'heartbeat' or status update to the C2 server at regular intervals, and the server may respond with commands. The short duration and consistent small data volume are hallmarks of this behavior, as opposed to normal traffic patterns which typically vary in size and timing.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.