ECCouncil 312-49v11 Question Answer
In the course of a detailed investigation into a potential breach, forensic analysts scrutinize the logs of an organization’s security devices and uncover an unexpected pattern of activity originating from an internal IP address. These activities involve frequent communication with an external server located in a foreign country, previously not associated with any authorized business functions. The volume of interactions is significantly higher than what is typically seen in standard operations for this particular system. Some of the requests reveal an unusual type of data—large binary files—that are atypical for the kind of processes the internal systems typically perform. Upon further analysis, the data exchanges appear to be irregular, as they do not align with any known workflows, and the destination server is outside the organization ' s usual trusted zones. Which indicator of compromise (IoC) does this behavior most likely signify?

