An attacker registers a domain that a client connects to based on DNS records and sends malware throughthat connection.
B.
An attacker opens a reverse DNS shell to get into the client’s system and install malware on it.
C.
An attacker uses a non-standard DNS port to gain access to the organization’s DNS servers in order topoison the resolutions.
D.
An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a maliciousdomain.
The Answer Is:
A
This question includes an explanation.
Explanation:
DNS tunneling is a technique that exploits the DNS protocol to tunnel malware and other data through a client-server model. DNS tunneling can be used for data exfiltration, command and control, or IP-over-DNS tunneling. DNS tunneling works by encoding the information of other protocols or programs in DNS queries and responses. An attacker registers a domain, such as badsite.com, and sets up a malicious DNS server that can interpret the encoded data. The attacker then infects a client with malware that can send and receive DNS queries to the attacker’s domain. The malware can use DNS queries to request commands from the attacker, or to send sensitive data to the attacker. The DNS queries and responses look like normal DNS traffic, but they contain hidden data that can bypass network defenses123. References := 1: What Is DNS Tunneling? - Palo Alto Networks 2: What is DNS Tunneling? - Check Point Software 3: What Is DNS Tunneling and How to Detect and Prevent Attacks
350-701 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 60% Discount on All Products,
Use Coupon: "8w52ceb345"