exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 294 discussion

Actual exam question from CompTIA's SY0-701
Question #: 294
Topic #: 1
[All SY0-701 Questions]

A security analyst is reviewing the logs on an organization's DNS server and notices the following unusual snippet:



Which of the following attack techniques was most likely used?

  • A. Determining the organization's ISP-assigned address space
  • B. Bypassing the organization's DNS sinkholing
  • C. Footprinting the internal network
  • D. Attempting to achieve initial access to the DNS server
  • E. Exfiltrating data from fshare.int.complia.org
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cri88
Highly Voted 8 months, 1 week ago
Selected Answer: C
C. Footprinting the internal network Explanation: The AXFR request is typically used by attackers to obtain a complete list of DNS records, which can reveal internal IP addresses and hostnames, thereby providing a detailed map of the internal network. This information can then be used for further attacks, such as identifying critical systems or planning network intrusions.
upvoted 5 times
...
9149f41
Most Recent 2 months, 4 weeks ago
Selected Answer: C
AXFR (Authoritative Zone Transfer) can be used to gather information about an internal network, which can be part of a footprinting technique. Footprinting is the process of collecting information about a target network to identify vulnerabilities and plan potential attacks. When an attacker performs an AXFR zone transfer, they can obtain a complete list of all DNS records within a domain, including hostnames and IP addresses. This information can be used to map out the internal network structure, identify critical systems, and discover potential targets for further exploitation. To mitigate this risk, it's important to secure AXFR transfers by implementing authentication and encryption, restricting zone transfers to authorized servers only, and monitoring for any unusual activity.
upvoted 1 times
...
a4e15bd
8 months, 1 week ago
Selected Answer: C
AXFR can be used for footprinting during the reconnaissance phase.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago