There seems to be some confusion with this. Essentially, what klooq and Mike said is correct, the same is stated in the official SECFND 210-250, the answer is B, but it cites C:
"B. DNS was not created for tunneling, but a few tools have used it to encapsulate data in the payload of DNS packets. Threat actors have been using many different untraditional techniques to steal data from corporate networks without being detected. For example, they have been sending stolen credit card data, intellectual property, and confidential documents over DNS using tunneling."
This section is not available anymore. Please use the main Exam Page.210-250 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Nickolos
4 years, 8 months agoMikefbr
5 years, 2 months agoklooq
5 years, 7 months ago