List of questions
Related questions
Question 339 - 312-50v12 discussion
John, a professional hacker, decided to use DNS to perform data exfiltration on a target network, in this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique. John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server. What is the technique employed by John to bypass the firewall?
A.
DNS cache snooping
B.
DNSSEC zone walking
C.
DNS tunneling method
D.
DNS enumeration
Your answer:
0 comments
Sorted by
Leave a comment first