How does DNS Tunneling exfiltrate data?
A) An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.
B) An attacker opens a reverse DNS shell to get into the client's system and install malware on it.
C) An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domain.
D) An attacker uses a non-standard DNS port to gain access to the organization's DNS servers in order to poison the resolutions.
Correct Answer:
Verified
Q1: What are two DDoS attack categories? (Choose
Q2: Which two capabilities does TAXII support? (Choose
Q3: Q5: In which form of attack is alternate Q6: Which two kinds of attacks are prevented Q7: How does Cisco Advanced Phishing Protection protect Q8: What are two rootkit types? (Choose two.) Q9: Which two behavioral patterns characterize a ping Q10: Which two conditions are prerequisites for stateful Q11: Which form of attack is launched using
A)
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents