What are the two ways threat actors use NTP? (Choose two.)

What are the two ways threat actors use NTP? (Choose two.)

  • Threat actors use NTP systems to direct DDoS attacks.
  • They place iFrames on a frequently used corporate web page.
  • They encode stolen data as the subdomain portion where the nameserver is under control of an attacker.
  • They place an attachment inside an email message.
  • They attack the NTP infrastructure in order to corrupt the information used to log the attack.