How might DNS be used by a threat actor to create mayhem?

IT Questions BankCategory: CCNA CyberOpsHow might DNS be used by a threat actor to create mayhem?

How might DNS be used by a threat actor to create mayhem?

  • Change the timestamp on network messages in order to conceal the cyberattack.
  • Surveil or deny service from outside the corporate network.
  • Collect personal information and encode the data in outgoing DNS queries.
  • Intercept and decrypt network traffic.

Explanation: Malware could be used by a threat actor to collect stolen encoded data, decode it, and then gain access to corporate data such as a username/password database.

Exam with this question: CCNA Cyber Ops Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x