1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
5

A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic inve

stigation and discovered a host had been compromised. Malicious code was using DNS as a tunnel to extract data from the client machine, which had been leaked and transferred to an unsecure public Internet site. Which of the following BEST describes the attack?
A. Phishing
B. Pharming
C. Cache poisoning
D. Data exfiltration
Computers and Technology
1 answer:
Damm [24]3 years ago
5 0

Answer:

D. Data exfiltration

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.

The type of attack in this scenario is best described as data exfiltration.

Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.

Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.

You might be interested in
What is computer software
Butoxors [25]
A set of instructions and documents that tells a computer what to do or how to perform a task or it can mean all the software on a computer,
7 0
3 years ago
Read 2 more answers
Trailer nodes at the end of the list should contain avalue ____ than the largest value in the dataset.
omeli [17]

Answer:

b. larger

Explanation:

Trailer nodes at the end of the list should contain avalue larger than the largest value in the dataset.

4 0
3 years ago
Which attitudes are most common among successful IT professionals?
Bess [88]

Answer:

understanding the problem very well

writing documention to every piece of code you write

write clear and concise code

follow Industry accepted format for data storage

avoid recursion if possible

write modular code

5 0
4 years ago
Assume you have the following array: int[] values = new int[15]; What will happen if the following code is executed? int[15] = 2
andrey2020 [161]

Answer:

You are creating an array "values" which stores 15 integers. And if we will write int[15]=20, we are not following correct syntax. Hence, nothing will happen, and it might however, throw an error that the syntax is wrong.

Explanation:

int[15]=20 is a wrong syntax, and hence nothing will happen or computer might throw an error like that not correct syntax is being used. And if we write values[15]=20,  It will certainly throw ArrayIndexOutOfBoundsException as the maximum length is fixed to 15 and values[14] and not more than that.  

3 0
4 years ago
Which combination of options is the keyboard shortcut to access the Find dialog box and search a worksheet for particular values
I am Lyosha [343]
<h3>Answer:</h3>

\boxed{Ctrl}+\boxed{F}

<h3>Explanation:</h3>

To remember this, remember that the F in Ctrl+F stands for “Find”.

Ctrl+H is a similar function called Find and Replace, which allows you to search for a value then replace all instances of it with a new value.

Ctrl+R fills from the selected cell(s) and to the right.

Ctrl+E activates the Flash Fil feature, which recognizes a pattern and fills in remaining cells automatically.

8 0
4 years ago
Other questions:
  • An effective password can help prevent
    11·2 answers
  • Write a program which selects two integer numbers randomly, adds the numbers and asks the user to enter the answer and then chec
    13·1 answer
  • The code that follows saves the data that was in the $names array as
    13·1 answer
  • Bullet points on a slide should be limited to _____. 2 4 8 10
    15·2 answers
  • How do you think engel would feel about computers information systems and the internet?
    14·2 answers
  • Need help developing code!!
    9·1 answer
  • Which of the following is a device that plugs in a usb port on the computer or mobile device and contains multiple usb ports?
    9·1 answer
  • if ur parent gets mad at u and says something then u say something, why do they say "stop back talking'' if ur just starting a c
    7·2 answers
  • Write a program that will read the payroll file. It should output the name and paycheck amount. Also output the total pay of all
    13·1 answer
  • Add the following numbers in abacus 2436+9214​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!