Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 124 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 124
Topic #: 1
[All 312-50v12 Questions]

John, a professional hacker, decided to use DNS to perform data exfiltration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server.
What is the technique employed by John to bypass the firewall?

  • A. DNSSEC zone walking
  • B. DNS cache snooping
  • C. DNS enumeration
  • D. DNS tunneling method
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
eli117
Highly Voted 1 year, 7 months ago
Selected Answer: D
DNS tunneling is a technique used to bypass network security controls by encapsulating non-DNS traffic within DNS packets. By embedding malicious data into the DNS protocol packets, an attacker can bypass firewalls and other security controls that are not configured to inspect DNS traffic. DNSSEC zone walking is a technique used to extract information from DNSSEC-signed zones by iterating over the DNS tree. DNS cache snooping is a technique used to obtain information about a DNS server's cache by sending queries for non-existent domain names. DNS enumeration is a technique used to gather information about a target network by querying DNS servers for information about the network's hosts and services.
upvoted 5 times
...
insaniunt
Most Recent 11 months ago
Selected Answer: D
D. DNS tunneling method
upvoted 1 times
...
IPconfig
1 year ago
Selected Answer: D
Since corrupt or malicious data can be secretly embedded into the DNS protocol packets, even DNSSEC cannot detect this abnormality in DNS tunneling It is effectively used by malware to bypass the firewall to maintain communication between the victim machine and the C&C server
upvoted 1 times
...
Vincent_Lu
1 year, 4 months ago
Selected Answer: D
D. DNS tunneling method Most Voted
upvoted 2 times
...
victorfs
1 year, 6 months ago
Selected Answer: D
D. DNS tunneling method
upvoted 2 times
...
jeremy13
1 year, 6 months ago
Selected Answer: D
D. DNS tunneling method like V11 Q173
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...