Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 324 discussion

Actual exam question from ISC's CISSP
Question #: 324
Topic #: 1
[All CISSP Questions]

Which of the following is a PRIMARY security weakness in the design of Domain Name System (DNS)?

  • A. Each DNS server must hold the address of the root servers.
  • B. A DNS server can be disabled in a denial-of-service (DoS) attack.
  • C. A DNS server does not authenticate source of information.
  • D. A DNS server database can be injected with falsified checksums.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stickerbush1970
Highly Voted 2 years, 2 months ago
Selected Answer: C
What is a security weakness of the DNS protocol? DNS data that is provided by name servers lacks support for data origin authentication and data integrity. This makes DNS vulnerable to man in the middle (MITM) attacks, as well as a range of other attacks.
upvoted 12 times
klarak
6 months, 3 weeks ago
I think maybe the intention of the question is to point out that authentication for a DNS server is not secure by default. You either need AD-integration or DNSSEC to secure authentication.
upvoted 1 times
...
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
klarak
Most Recent 6 months, 3 weeks ago
Selected Answer: C
My worry is that this is an outdated question. Someone look this up in the study guide, please. C is correct, in that DNS can be setup to work without authentication. Normally, it doesn't anymore, unless someone's just acting like an idiot.
upvoted 2 times
...
Soleandheel
11 months, 2 weeks ago
C. A DNS server does not authenticate the source of information. The primary security weakness in the design of Domain Name System (DNS) is the lack of authentication of the source of information. This weakness can lead to various DNS-related attacks, such as DNS spoofing or cache poisoning, where malicious parties can provide false DNS information to redirect users to malicious websites or intercept their communications. DNSSEC (Domain Name System Security Extensions) is a protocol extension that addresses this weakness by providing data origin authentication and data integrity verification for DNS information.
upvoted 2 times
...
[Removed]
11 months, 3 weeks ago
Selected Answer: B
I think its B because I know dnssec
upvoted 2 times
...
Rollingalx
1 year, 7 months ago
Selected Answer: C
I go with C. The key word in the question is design.
upvoted 2 times
...
Dee83
1 year, 10 months ago
C. A DNS server does not authenticate source of information.
upvoted 1 times
...
oudmaster
1 year, 11 months ago
DoS is not a protocol security design problem. Every protocol and every app is subject to DoS attacks. You can mitigate it with security controls. But by nature DNS does not authenticate the source. So any host can query and get reply from DNS server. The protocol itself when was designed did not involve authenticate the source hosts.
upvoted 1 times
...
Peduk70
1 year, 11 months ago
B is more correct as C is not entirely true anymore. Initially, lack of authentication and integrity was a security concern with the use of DNS, however, this has been addressed since the inception of DNSSEC. DNSSEC adds two important features to the DNS protocol: Data origin authentication allows a resolver to cryptographically verify that the data it received actually came from the zone where it believes the data originated. Data integrity protection allows the resolver to know that the data hasn't been modified in transit since it was originally signed by the zone owner with the zone's private key. https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en
upvoted 3 times
...
rdy4u
2 years, 1 month ago
Selected Answer: C
The Domain Name System (DNS) is vital to the Internet, providing a mechanism for resolving host names into Internet Protocol (IP) addresses. Insecure underlying protocols and lack of authentication and integrity checking of the information within the DNS threaten the proper functionality of the DNS. https://blog.isc2.org/isc2_blog/2008/08/securing-dns-se.html
upvoted 1 times
...
mishu2513
2 years, 1 month ago
B is correct
upvoted 1 times
...
sec_007
2 years, 1 month ago
Selected Answer: B
B is correct. https://learn.g2.com/dns-security
upvoted 4 times
...
JAckThePip
2 years, 1 month ago
Answer is C "Attackers typically take advantage of the plaintext communication between clients and the three types of DNS servers. Another popular attack strategy is to log in to a DNS provider's website with stolen credentials and redirect DNS records." https://www.techtarget.com/searchsecurity/definition/DNS-attack
upvoted 2 times
...
Yanjun
2 years, 2 months ago
Selected Answer: C
It should be C
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...