An analyst performs traffic analysis to detect data exfiltration and identifies a high frequency of DNS requests in a small period of time. Which technology makes this behavior feasible?
In the context of detecting data exfiltration, tunnels can be used to encapsulate and hide network traffic within another protocol, such as DNS. This allows attackers to transfer data out of a network without being easily detected, as DNS traffic is common and often not closely inspected for performance reasons.
The high number of DNS requests in a short period of time could be indicative of an attempt at covert data exfiltration using DNS tunnels, where data is hidden within DNS traffic to avoid detection.
upvoted 4 times
...
This section is not available anymore. Please use the main Exam Page.200-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
KevinCondor
7 months, 2 weeks ago