After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?
A. Covert channels
Explanation:
Covert channels are methods used to secretly transfer data in a way that is not intended or expected. In this case, the hacker is using the DNS protocol, which is typically used for domain name resolution, to secretly exfiltrate data. This is a classic example of using a covert channel to bypass traditional security monitoring, as DNS traffic is often not closely inspected for data exfiltration.
Why the other answers are incorrect:
B. File sharing services: These involve legitimate or rogue services like Dropbox, Google Drive, etc., for data transfer, not DNS-based exfiltration.
C. Steganography: Involves hiding data within other files, like images or audio, not within DNS queries or traffic.
D. Rogue service: Refers to unauthorized services running on a system, but it doesn’t specifically describe using DNS as a channel for exfiltration.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
044f354
1 month, 3 weeks ago