Correct Answer A
The attacker registers a domain, such as badsite.com. The domain’s name server points to the attacker’s server, where a tunneling malware program is installed.
The attacker infects a computer, which often sits behind a company’s firewall, with malware. Because DNS requests are always allowed to move in and out of the firewall, the infected computer is allowed to send a query to the DNS resolver. The DNS resolver is a server that relays requests for IP addresses to root and top-level domain servers.
The DNS resolver routes the query to the attacker’s command-and-control server, where the tunneling program is installed. A connection is now established between the victim and the attacker through the DNS resolver. This tunnel can be used to exfiltrate data or for other malicious purposes. Because there is no direct connection between the attacker and victim, it is more difficult to trace the attacker’s computer.
The attacker registers a domain, such as badsite.com. The domain’s name server points to the attacker’s server, where a tunneling malware program is installed.
The attacker infects a computer, which often sits behind a company’s firewall, with malware. Because DNS requests are always allowed to move in and out of the firewall, the infected computer is allowed to send a query to the DNS resolver. The DNS resolver is a server that relays requests for IP addresses to root and top-level domain servers.
DNS tunneling is a technique used by attackers to exfiltrate data by encoding the data into DNS queries or responses. The attacker creates a covert communication channel between the victim's computer and a server controlled by the attacker. This technique uses the DNS protocol to bypass firewalls and other network security measures.
The correct answer is A. An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection. The attacker creates a DNS tunnel by encoding the data in the DNS queries or responses that are sent to the server controlled by the attacker. The server then extracts the data from the queries or responses and sends it to the attacker.
Does anyone else think this questions answers have been mixed up with Question 16?
upvoted 4 times
...
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Alee86
Highly Voted 3Â years, 3Â months agodavezz
2Â years, 5Â months agoic0deem
Highly Voted 3Â years, 3Â months agoMarshpillowz
Most Recent 8Â months, 3Â weeks agoklu16
10Â months, 1Â week ago[Removed]
1Â year, 4Â months agoCokamaniako
1Â year, 6Â months agoBrain_Power
1Â year, 6Â months agosull3y
1Â year, 8Â months agoSmileebloke
2Â years, 8Â months agoffsilveira10
1Â year, 2Â months agowhiteherondance
3Â years ago