exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 211 discussion

Actual exam question from CompTIA's PT0-002
Question #: 211
Topic #: 1
[All PT0-002 Questions]

A penetration tester attempted a DNS poisoning attack. After the attempt, no traffic was seen from the target machine. Which of the following MOST likely caused the attack to fail?

  • A. The injection was too slow.
  • B. The DNS information was incorrect.
  • C. The DNS cache was not refreshed.
  • D. The client did not receive a trusted response.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RRabbit_111
Highly Voted 1 year, 9 months ago
Selected Answer: D
D. The client did not receive a trusted response. DNS poisoning, also known as DNS spoofing, is a type of attack in which an attacker alters the mapping of a domain name to an IP address, redirecting traffic from the intended domain to a malicious domain. If no traffic was seen from the target machine after the attempted DNS poisoning attack, it is most likely that the client did not receive a trusted response. This means that the client's DNS resolver did not trust the response from the attacker and did not update its cache with the malicious mapping provided by the attacker. This happens when the client's DNS resolver has implemented security measures such as DNSSEC (Domain Name System Security Extensions) which is a set of security extensions to DNS that provide authentication of DNS data and integrity of DNS data. In contrast, if the injection was too slow, the DNS information was incorrect, or the DNS cache was not refreshed, it would not prevent the client from receiving a trusted response and may not have prevented the attack from being successful.
upvoted 11 times
...
pepgua
Most Recent 5 months ago
In a successful DNS poisoning attack, the attacker aims to redirect the target machine's traffic by providing false DNS information. The lack of traffic from the target machine suggests the redirection failed. Therefore, the most likely reason for the attack's failure is: D. The client did not receive a trusted response. D. The client did not receive a trusted response: This is the MOST likely culprit. DNS servers often implement security measures to validate responses. If the attacker's response lacked proper authentication or was flagged as suspicious, the client machine wouldn't trust it and wouldn't attempt to connect to the provided addresses, resulting in no traffic.
upvoted 1 times
...
Yokota
9 months, 1 week ago
Selected Answer: D
If the DNS cache already contained a valid entry for the requested domain, the target machine would not send out a new DNS request until that cache entry expired
upvoted 2 times
...
LiveLaughToasterBath
9 months, 2 weeks ago
Selected Answer: C
From Cloudflare: A DNS resolver will save responses to IP address queries for a certain amount of time. In this way, the resolver can respond to future queries much more quickly, without needing to communicate with the many servers involved in the typical DNS resolution process. DNS resolvers save responses in their cache for as long as the designated time to live (TTL) associated with that IP address allows them to. Instead of using TCP, which requires both communicating parties to perform a 'handshake' to initiate communication, DNS requests and responses use UDP, or the User Datagram Protocol. With UDP, there is no guarantee that a connection is open or that the recipient is ready to receive. UDP is vulnerable to forging for this reason – an attacker can send a message via UDP and pretend it is a response from a legitimate server by forging the header data. If a DNS resolver receives a forged response, it accepts and caches the data uncritically because there is no way to verify if the information is accurate and comes from a legitimate source.
upvoted 1 times
LiveLaughToasterBath
9 months, 2 weeks ago
Also, per CloudFlare: Much like TLS/SSL, DNSSEC uses public key cryptography (a way of digitally signing information) to verify and authenticate data. DNSSEC extensions were published in 2005, but DNSSEC is not yet mainstream, leaving DNS still vulnerable to attacks.
upvoted 1 times
...
...
solutionz
1 year, 3 months ago
Selected Answer: C
DNS poisoning relies on corrupting the DNS cache with incorrect information to redirect traffic to a malicious destination. If the target machine's DNS cache is not refreshed to include the poisoned information, the attack will fail because the target will continue using the legitimate DNS information. Therefore, the option that most likely caused the attack to fail is: C. The DNS cache was not refreshed.
upvoted 4 times
...
RAMI_PAL
1 year, 5 months ago
Selected Answer: A
A.The injection was too slow. The malicious response needs to arrive before the legitimate DNS server. If the timing isn’t right, the legitimate response will be accepted.
upvoted 1 times
...
[Removed]
1 year, 6 months ago
Selected Answer: D
D. The client did not receive a trusted response is the most likely reason for the attack to fail. DNS poisoning attack aims to introduce false information into a DNS resolver's cache. When the client requests a domain name resolution, the resolver looks up the information in its cache first. If the attacker has successfully poisoned the cache with false information, the client may be directed to a fake website, or its traffic could be redirected to a server controlled by the attacker. However, modern operating systems and browsers have implemented measures such as DNSSEC and DNS over HTTPS (DoH) to protect against DNS poisoning attacks. These technologies provide cryptographic validation of DNS responses and secure communication between the client and resolver, respectively. If the client did not receive a trusted response from the resolver, it could be due to these security measures in place.
upvoted 1 times
...
cy_analyst
1 year, 7 months ago
Selected Answer: C
DNS poisoning, also known as DNS spoofing, is a technique used to manipulate DNS resolver cache information so that the target machine is redirected to a malicious website or server. However, if the DNS cache on the target machine has not been refreshed, it will still contain the correct DNS information, which means that the attack would fail.
upvoted 2 times
cy_analyst
1 year, 7 months ago
In summary, the lack of traffic from the target machine suggests that the attack was not successful in redirecting the target machine to the attacker's malicious website or server. The most likely reason for this is that the target machine's DNS cache was not vulnerable or the attack was not successful in injecting the malicious DNS information.
upvoted 1 times
...
cy_analyst
1 year, 7 months ago
It's D because if the client did not receive a trusted response, it would not use the attacker's DNS server and the attack would fail.
upvoted 1 times
...
[Removed]
1 year, 7 months ago
D is the answer
upvoted 2 times
...
...
nickwen007
1 year, 8 months ago
D. The client did not receive a trusted response is the most likely cause of the attack failing. In a DNS poisoning attack, the attacker attempts to redirect traffic from a legitimate website to a malicious site by altering the entries in the Domain Name System (DNS). If the client does not receive a trusted response from the DNS server, the attack will fail.
upvoted 3 times
...
[Removed]
1 year, 8 months ago
I think D is correct
upvoted 2 times
...
[Removed]
1 year, 8 months ago
C or D iam confused share your correct answer
upvoted 1 times
...
kloug
1 year, 8 months ago
ddddddddddddd
upvoted 3 times
...
2Fish
1 year, 8 months ago
Selected Answer: D
My best guess would be D. ChatGPT seems to agree, but that could also be wrong.
upvoted 3 times
...
[Removed]
1 year, 8 months ago
I think C is correct
upvoted 2 times
...
masso435
1 year, 11 months ago
Selected Answer: A
Answer is A
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago