Multiple Choice
How does DNS Tunneling exfiltrate data?
A) An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.
B) An attacker opens a reverse DNS shell to get into the client's system and install malware on it.
C) An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domain.
D) An attacker uses a non-standard DNS port to gain access to the organization's DNS servers in order to poison the resolutions.
Correct Answer:

Verified
Correct Answer:
Verified
Q39: An organization is trying to implement micro-segmentation
Q40: How is Cisco Umbrella configured to log
Q41: The main function of northbound APIs in
Q42: Which Cisco security solution protects remote users
Q43: Which two activities can be done using
Q45: Which two key and block sizes are
Q46: How is ICMP used an exfiltration technique?<br>A)
Q47: An engineer is configuring AMP for endpoints
Q48: In a PaaS model, which layer is
Q49: What is the function of the Context