Q: 7
[Security Architecture]
A senior security engineer flags the following log file snippet as having likely facilitated an attacker’s
lateral movement in a recent breach:
qry_source: 19.27.214.22 TCP/53
qry_dest: 199.105.22.13 TCP/53
qry_type: AXFR
| in comptia.org
------------ directoryserver1 A 10.80.8.10
------------directoryserver2 A 10.80.8.11
------------ directoryserver3 A 10.80.8.12
------------ internal-dns A 10.80.9.1
----------- www-int A 10.80.9.3
------------ fshare A 10.80.9.4
------------ sip A 10.80.9.5
------------ msn-crit-apcs A 10.81.22.33
Which of the following solutions, if implemented, would mitigate the risk of this issue reoccurring?
Options
Discussion
Option D Limiting DNS queries to internal clients should stop outside parties from getting this info, right?
D or B. Based on exam reports, internal-only DNS queries and restricting traffic to UDP/53 are both mentioned as fixes for DNS issues, so either might work. The official guide's security best practices chapter covers this scenario too.
Be respectful. No spam.