Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

A cybersecurity analyst is working on an open investigation for a company. The s

ID: 3751493 • Letter: A

Question


A cybersecurity analyst is working on an open investigation for a company. The security analyst reviewed several security logs upon arriva. The following is a snippet of code reviewed in the security logs: tlocalhost] /dnsrecon.db -t rvs -i 192.168.1.1, 192.168.1.20 [localhost] echovar/log/auth.log Which of the following BEST describes what the analyst has just observed in the logs? (Select TWo) the hostname for 192.1.1.0/24 DA B. Dc O D E. The user who was accessing the machine was attempting to enumerate t The user who was accessing The user who was accessing the machine was attempting to cover up any tracks The user who was accessing the machine was attempting to reverse lookup for the hostname The user who was accessing the machine was attempting to retrieve standard DNS records but failed the machine was attempting to perform a DNS poisoning attack

Explanation / Answer

Dns Reconnaissance is used to gather the information on the dns servers.

It can be used to perform

Zone walking :

Zone transfer: This helps to retrieve the topology of network infrastructure.

Google lookup

Reverse lookup : It is finding domain name from lookong the IP addresses.

Domain and host brute force : This helps brute force and find the domains of the servers even by using a name list.

Cache snooping: It can be occured only if dns is cached.This helps to retrieve more information on dns.

Standard record enumeration: This helps to know the some of protocols used and SRV records.

In the above question

Option D Is solution.

The user who was accessing machine is trying to reverse lookup the dns records.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote