How might DNS be used by a threat actor to create mayhem?
- Change the timestamp on network messages in order to conceal the cyberattack.
- Surveil or deny service from outside the corporate network.
- Collect personal information and encode the data in outgoing DNS queries.
- Intercept and decrypt network traffic.
Explanation: Malware could be used by a threat actor to collect stolen encoded data, decode it, and then gain access to corporate data such as a username/password database.
Exam with this question: CCNA Cyber Ops Final Exam Answers
Please login or Register to submit your answer