ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 102 Topic 11 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 102 Topic 11 Discussion

312-50v13 Exam Topic 11 Question 102 Discussion:
Question #: 102
Topic #: 11

John, a professional hacker, decided to use DNS to perform data exfiltration on a target network, in this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique. John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server. What is the technique employed by John to bypass the firewall?


A.

DNS cache snooping


B.

DNSSEC zone walking


C.

DNS tunneling method


D.

DNS enumeration


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.