exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 16 discussion

Actual exam question from Cisco's 350-701
Question #: 16
Topic #: 1
[All 350-701 Questions]

How is DNS tunneling used to exfiltrate data out of a corporate network?

  • A. It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers
  • B. It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data
  • C. It redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network
  • D. It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Jetnor
Highly Voted 7 months ago
Selected Answer: B
I would go with B, based on the question . because we are asked how is DNS tunneling used, and the attacker encodes text information in base64 to then send it to the malicious DNS server which is mentioned at the end of the question (DNS server rebuilds the exfiltrated data) "C" does not explain how the information is encoded.
upvoted 7 times
...
chikatchy
Most Recent 6 months, 3 weeks ago
The answer is B.
upvoted 1 times
...
gamingoddess
7 months ago
Selected Answer: B
Attackers can use outbound DNS requests to send encoded exfiltrated data to their infrastructure. The DNS tunneling client malware on the infected machine reads the data to be exfiltrated line by line, slices the data into small chunks and performs base64 encoding on each line. So, option B is the closest to describing how DNS tunneling is used to exfiltrate data out of a corporate network.
upvoted 1 times
...
Premium_Pils
7 months ago
Selected Answer: B
Maybe it is just me, but I can't see how "redirection" would fit in. "attackers use the DNS protocol to embed data within packets in DNS queries", and get the data shipped out to the attackers DNS server. (not redirecting, just directing it to the malicious server) The data needs to be split into smaller chunks (to be protocol conform), and is often encoded with base64. https://www.akamai.com/glossary/what-is-dns-data-exfiltration https://bluegoatcyber.com/blog/dns-exfiltration-with-base64-encoding-a-stealthy-data-theft-technique/ I vote for B.
upvoted 1 times
...
Marshpillowz
1 year ago
Selected Answer: B
B is correct
upvoted 1 times
...
klu16
1 year, 2 months ago
Well, for me it all depends if these answers are really worded like this. If so, then B cannot be correct, because DNS servers do not rebuild information (DNS server's role is to handle DNS queries and responses). Option C seems to be the most logical, since the data is encoded, then the encoded payload is inserted into DNS queries and manipulated DNS packets are sent to a malicious DNS server controlled by the attacker. I think I will go with answer C because of that.
upvoted 1 times
...
Cokamaniako
1 year, 10 months ago
Selected Answer: B
The DNS server can not rebuild information.
upvoted 1 times
...
littlewilly
1 year, 11 months ago
Selected Answer: C
This is C
upvoted 2 times
...
stalkr3
2 years ago
B is false imo - "It encodes the payload with RANDOM characters..." - What is the point of exfiltrating random characters?
upvoted 2 times
...
pioo1979
2 years, 1 month ago
I think the correct answer is C. B - "It encodes the payload with RANDOM characters..." There is no sense to exfiltrate random data..
upvoted 1 times
...
sull3y
2 years, 3 months ago
B. It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data DNS Tunneling is a technique used to exfiltrate data out of a corporate network by encoding the payload with random characters that are broken into short strings and then sending these strings as DNS queries. These queries are sent to a domain controlled by the attacker, which then rebuilds the exfiltrated data. This technique takes advantage of the fact that many corporate networks allow outgoing DNS queries, while other types of traffic may be blocked. Option A, It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers, is not exactly the way DNS Tunneling works, it's more about encoding data into DNS queries and exfiltrating it through this channel.
upvoted 4 times
sull3y
2 years, 3 months ago
Option C, It redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network, is not exactly how DNS Tunneling works. This technique is more about exfiltrating data, not stealing credentials. Option D, It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks, is not exactly how DNS Tunneling works. DNS Tunneling is more about exfiltrating data, not corrupting DNS servers.
upvoted 1 times
...
...
Anonymous983475
2 years, 3 months ago
Selected Answer: C
C should be the correct answer. for more inforwation watch this short vid https://www.paloaltonetworks.com/cyberpedia/what-is-dns-tunneling
upvoted 1 times
Anonymous983475
2 years, 3 months ago
Actually jaciro11 is right, C is correct, but the keyword "redirrect" makes it incorrect as the information is exfiltrated by being encoded in base64
upvoted 1 times
...
...
jaciro11
3 years, 1 month ago
Selected Answer: B
Once the desired data is obtained, the payload encodes the data as a series of 32 characters broken into short strings... The problem with answer C, is that this not only to get credentials
upvoted 2 times
...
brownb
3 years, 5 months ago
Im leaning more toward C in this case. Is the point of the DNS attack not to redirect the victim to a server to then attempt to steal data?
upvoted 2 times
_nomad_
3 years, 4 months ago
me too
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago