How might DNS be used by a threat actor to create mayhem?

IT Questions BankCategory: CCNA CyberOpsHow might DNS be used by a threat actor to create mayhem?
How might DNS be used by a threat actor to create mayhem? 1ITExamAnswers Staff asked 9 months ago

How might DNS be used by a threat actor to create mayhem?

  • Change the timestamp on network messages in order to conceal the cyberattack.
  • Surveil or deny service from outside the corporate network.
  • Collect personal information and encode the data in outgoing DNS queries.
  • Intercept and decrypt network traffic.

Explanation: Malware could be used by a threat actor to collect stolen encoded data, decode it, and then gain access to corporate data such as a username/password database.

More Questions: CCNA Cyber Ops Final Exam Answers


Related Articles