exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 290 discussion

Actual exam question from Cisco's 350-701
Question #: 290
Topic #: 1
[All 350-701 Questions]

Which type of DNS abuse exchanges data between two computers even when there is no direct connection?

  • A. malware installation
  • B. network footprinting
  • C. command-and-control communication
  • D. data exfiltration
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ums008
Highly Voted 1 year, 9 months ago
Selected Answer: C
I believe Answer is C: Command-and-control (C2) communication refers to a type of DNS abuse where malware-infected devices establish communication with a command-and-control server. This communication occurs even when there is no direct connection between the infected device and the command-and-control server. Option D, data exfiltration, refers to the unauthorized transfer of data from a compromised network or device to an external location. While data exfiltration can occur using various methods, such as DNS tunnels, it does not specifically refer to the exchange of data between two computers without a direct connection.
upvoted 6 times
...
itashraf
Highly Voted 3 years, 7 months ago
https://awakesecurity.com/blog/dns-exfiltration-the-light-at-the-end-of-the-dns-tunnel/ answer D
upvoted 5 times
Premium_Pils
8 months, 2 weeks ago
"DNS data exfiltration is a way to exchange data between two computers without any direct connection."
upvoted 1 times
...
...
kloug
Most Recent 6 months ago
Answer c
upvoted 1 times
...
Premium_Pils
6 months ago
Selected Answer: D
D
upvoted 1 times
...
skjs
1 year, 1 month ago
Selected Answer: D
DNS tunneling is a common Covert Communication use for Data exfiltration.
upvoted 2 times
...
Jessie45785
2 years ago
Selected Answer: D
Data exfiltration is the most common Dhttps://www.examtopics.com/exams/cisco/350-701/view/#NS protocol abused https://www.akamai.com/blog/news/introduction-to-dns-data-exfiltration
upvoted 3 times
...
loser4fun
2 years, 1 month ago
I would go with option D Data exfiltration involves the unauthorized transfer of sensitive data from an organization's network to an external location, typically controlled by an attacker. Attackers often use DNS as a means of data exfiltration, as it allows them to bypass traditional network security controls and transmit data using domain name queries and responses. Command-and-control (C2) communication is another type of DNS abuse used by attackers to remotely control compromised devices, but it does not involve the exchange of data between two computers.
upvoted 2 times
...
Tuxzinator
2 years, 2 months ago
Selected Answer: C
ommand-and-control (C2) communication is a type of DNS abuse that is used by malware to communicate with a remote server or attacker. In this type of attack, the malware will use DNS requests and responses to exchange data with the remote server or attacker, even if there is no direct connection between the two computers. The attacker can use this communication to send commands to the malware, exfiltrate data from the infected computer, or to download additional malware onto the system. Data exfiltration (option D) refers to the unauthorized transfer of data from a computer or network to a remote server or attacker. This may be done through a variety of methods, including email, file transfer, or DNS requests. However, data exfiltration does not involve the exchange of data between two computers when there is no direct connection.
upvoted 4 times
...
Emlia1
2 years, 4 months ago
Selected Answer: D
D is correct
upvoted 2 times
...
Jamesy
2 years, 7 months ago
Hi guys, agree with "DNS data exfiltration is a way to exchange data between two computers without any direct connection" When it is talking about Abuse option C is correct in my opinion. Please share your thoughts. Thanks
upvoted 3 times
...
itashraf
3 years, 7 months ago
D is correct answer
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago