I believe Answer is C:
Command-and-control (C2) communication refers to a type of DNS abuse where malware-infected devices establish communication with a command-and-control server. This communication occurs even when there is no direct connection between the infected device and the command-and-control server.
Option D, data exfiltration, refers to the unauthorized transfer of data from a compromised network or device to an external location. While data exfiltration can occur using various methods, such as DNS tunnels, it does not specifically refer to the exchange of data between two computers without a direct connection.
Data exfiltration is the most common Dhttps://www.examtopics.com/exams/cisco/350-701/view/#NS protocol abused
https://www.akamai.com/blog/news/introduction-to-dns-data-exfiltration
I would go with option D
Data exfiltration involves the unauthorized transfer of sensitive data from an organization's network to an external location, typically controlled by an attacker. Attackers often use DNS as a means of data exfiltration, as it allows them to bypass traditional network security controls and transmit data using domain name queries and responses.
Command-and-control (C2) communication is another type of DNS abuse used by attackers to remotely control compromised devices, but it does not involve the exchange of data between two computers.
ommand-and-control (C2) communication is a type of DNS abuse that is used by malware to communicate with a remote server or attacker. In this type of attack, the malware will use DNS requests and responses to exchange data with the remote server or attacker, even if there is no direct connection between the two computers. The attacker can use this communication to send commands to the malware, exfiltrate data from the infected computer, or to download additional malware onto the system.
Data exfiltration (option D) refers to the unauthorized transfer of data from a computer or network to a remote server or attacker. This may be done through a variety of methods, including email, file transfer, or DNS requests. However, data exfiltration does not involve the exchange of data between two computers when there is no direct connection.
Hi guys, agree with "DNS data exfiltration is a way to exchange data between two computers without any direct connection"
When it is talking about Abuse option C is correct in my opinion. Please share your thoughts. Thanks
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ums008
Highly Voted 1 year, 9 months agoitashraf
Highly Voted 3 years, 7 months agoPremium_Pils
8 months, 2 weeks agokloug
Most Recent 6 months agoPremium_Pils
6 months agoskjs
1 year, 1 month agoJessie45785
2 years agoloser4fun
2 years, 1 month agoTuxzinator
2 years, 2 months agoEmlia1
2 years, 4 months agoJamesy
2 years, 7 months agoitashraf
3 years, 7 months ago