A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic investigation and discovered a host had been compromised. Malicious code was using DNS as a tunnel to extract data from the client machine, which had been leaked and transferred to an unsecure public Internet site. Which of the following BEST describes the attack?
A. Phishing
B. Pharming
C. Cache poisoning
D. Data exfiltration

Answers

Answer 1

Answer:

D. Data exfiltration

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.

The type of attack in this scenario is best described as data exfiltration.

Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.

Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.


Related Questions

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Answers

Answer:

Key escrow.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

What is office technology?​

Answers

Answer:

Explanation:

Office Technology is the study of a wide range of subjects related to careers in the modern office of today. This program provides the training necessary to perform successfully in the many and varied clerical, secretarial, and office administrative positions.

donde veo haikyuu en español sin lag ni virus :C (la segunda, tercera y cuarta temporada)

Answers

Answer:

keep in English language

Explanation:

keep in English

Who said the following, and what does it mean? Conceit, more rich in matter than in words, Brags of his substance, not of ornament. They are but beggars that can count their worth; But my true love is grown to such excess I cannot sum up half my sum of wealth. (II. vi. 33-37) Juliet; she is saying that she doesn't care about money. Lady Capulet; she is reminding Juliet how lucky she is to be marrying Paris. Romeo; he is saying that true understanding has made him realize how very lucky he is to be marrying Juliet. Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Answers

Answer: Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Explanation:

Juliet was talking to Romeo in this instance and trying to tell him that it was easy to speak words but that for those words to be properly understood, action must follow them.

In other words she was telling him that to truly understand something, actions must back it up. She then goes on to say to him that the love she has is so much that it has made her feel more wealthy.

An end-user license agreement protects _____.

Answers

End User License Agreements are important for protecting the rights of the business owner/licensor and critical for setting the rules of use and managing the expectations of the end-user.

Answer: both the owner and the purchaser of the software

Explanation:

describe how it is necessary to design documents, files, forms/inputs, reports/outputs and validation​

Answers

Answer:

Explanation:

Good organization, complete information and clear writing are the most effective ways to design a document.

I hope this helps

write the step by approach to re saving a document using the save as option

Answers

Press save as and then choose your location to save it and then click save

A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101. What is the decimal value of the host portion of the address?

Answers

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

outline the steps involved in signing into your account​

Answers

You put in your username or email and then you put in your password! It’s as simple as that :D

Express your opinion on whether a successful business analyst can be a good programmer. support your answers with reason

Answers

I think that a successful business analyst could be a good programmer because if they had the write training and experience they could learn about that field of work and become good at programming

How would you approach a friend that you suspect is addicted to technology?

Answers

Ask them to go out on a picnic or something that doesn’t involve technology and if they bring up excuses, tell them that it’s not healthy to be on their phones or other devices all the time.

You would approach a friend that you suspect is addicted to technology in numerous ways. Some of them are as follows:

Guide that individual towards tour and travel which can not include technology. Advise him to give tips on meditation and its benefits.Plan a regular schedule for exercise. Try to give the advantages of being familiar with family members.

What are the disadvantages of technology?

The disadvantages of technologies are as follows:

It stimulates social isolation and loneliness.Complete waste of time.It builds negative impacts on young students. Gradual degradation of mental health and memory.

According to the context of this question, technology addiction becomes normal in the present scenario. So, in order to prevent yourself and your family members from these traps follow some well-determined and strict routine and try to spend time with the family members, games that do not involve technology, meditation, exercise, etc.

Therefore, you would approach a friend that you suspect is addicted to technology in numerous ways. Some of them are well mentioned above.

To learn more about Technology addiction, refer to the link:

https://brainly.com/question/9552314

#SPJ5

what is the example of HTML?​

Answers

Answer:

For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data table

In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

Answers

Answer:

Data administration.

Explanation:

Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.

Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?

Answers

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

The number of swappings needed to sort the number 8, 22, 7, 9, 31 in ascending order, using bubble sort is

Answers

Answer:

3

Explanation:

swap the 7 with the 22

swap the 7 with the 8

swap the 9 with the 22

What is the positional weigh of the digit 7 in the octal number 7642 ?​

Answers

Answer:

111 is the answer..i hope it helps

Shelby wants to move “ExpirationDate” to the top of the datasheet. What should she do?

Answers

Select row for "ExpirationDate", click the mouse and drag the field until the blue line appears above "Scent," and release the mouse button.

What is the role of memory in a computer​

Answers

Answer:

Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.

Anyone know how to make website (PROFESSIONAL)

Answers

Answer:I know how to make a professional website

Explanation:

Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.

Answers

Answer:

Lets us take k, m = 10, 40

q = 0

i = k

while i <= m:

   if int(i*0.5)*2 == i:

       q += 1

   i += 1

what allows an individual or company to share a post with an audience however they are designed to be used with mobile devices and limit the size of posts

Answers

Answer:

E-mail

Explanation:

The sending of messages via the Internet is known as e-mail. It is one of the most often utilised functionalities for sending text, files, pictures, and other attachments across a communications network.

A podcast lets a person or corporation to share articles with an audience, but it is geared for usage on mobile devices and has a capacity restriction.

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?

Answers

Answer:

Data and Insights

Explanation:

In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.

Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.

Thus the answer is 'data and insights'.

Distinguish between afax and a telephone call (5points)​

Answers

Answer:
A fax is an exact copy of a document made by electronic scanning where as a telephone call is a communication or conversation via a telephone

How can computer be beneficial in agriculture and tourism​

Answers

The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

What is thesql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a grand total for all product sales

Answers

Answer:

The answer is below

Explanation:

The the sql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a grand total for all product sales is:

SELECT S.CUS_CODE, T.TM_MONTH, S.P_CODE,

SUM(S.SALE_UNITS*S.SALE_PRICE) AS "TOTSALES"

FROM DWDAYSALESFACT AS S INNER JOIN DWTIME AS T ON S.TM_ID =

T.TM_ID

GROUP BY S.CUS_CODE,T.TM_MONTH,S.P_CODE WITH ROLLUP;

is computers takes lots of time to do any mathematical calculations.​

Answers

Answer:

I think the answer is a computer take lost of time to do any mathematical calculations because problem in the book or questions.

Hope this helps you ^^

Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer

Answers

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

How do you connect asp.Net mvc web application in visual studio 2013 to a database created in mysql query browser

Answers

Solution :

Asp.Net is a programming language of Microsoft. It stands for  Active Server Pages. It was developed by the giant, Microsoft which provides and helps the programmers to build a dynamic web sites, services and applications.

Using the asp.Net we can create a web application which provides interface to the existing database.

Creating an ASP.NET web application :

-- We create a new project in the Visual Studio in the same solution or the new solution and then select asp.NET web app template.

-- Name this project as ContosoSite.

-- Click OK.

-- Now in the project window of a new asp.Net project window, we select the MVC template.

-- Clear the Host in Cloud option as of now as we can deploy the application to the cloud later on.

-- Click ok for creating the application.

A finite set of values along with set of rules for permissible operations is called ______


Data type

Class

Methods

Answers

Answer(data type) is your answer

Data type is the correct answer
Other Questions
Find the surface area of each figure. Round your answers to the nearest tenth, if necessary A tribe prohibits its members from marrying someone who does not belong to the tribe. This an example of _____.exogamy monogamy endogamy polygyny What nation's progress has heavily influencedSoutheast Asia?A. RussiaB. JapanC. IndiaD. China Logan has $1.95 in dimes and quarters in his pocket. He has 2 more dimes than quarters. (Keep in mind that dimes are worth 10c and quarters 25c.)1. Write an equation that will help you determine the number of quarters.2. Solve the equation showing all your steps.3. Tell how many quarters and dimes he has. The polynomial P is graphed.5+P4+3-3-2-11-2+-3+-4-What is the remainder when P(x) is divided by (x + 2)? Find the x- and y-intercept of the line X+4y=36 6. We should believe what Jim is telling us. If there ____morning, the postman could have begun his round later or the postal van could have broken down again.A.would have been B. was C. had been D. were 7. Her unexpected arrival probably saved his life. Ten minutes later the fire _____impossible to control. A. had been B. might be C. must have been D. would have been they 8. The base can only be supplied through light biplanes carrying up to a to of cargo. An aircraft that_____ large enough to carry ten tons would need a much longer runway. A. would have been B. has been C. would be D. is 9. It's not difficult to imagine how Dave would react if one of his partners____ with bankruptcy. A. were threaten B. were threatened C. threatened D. threate You are new to an organization and do not really know what to expect about the socialization process. You recently received your MBA and have an undergraduate degree in computer science. Your new firm is a software development company with an emphasis in the healthcare industry. Your hiring process included campus interviews, a daylong trip for an interview at the company, an offer phone call and letter, and some promotional material sent via the mail. When you arrive for your first day at work, you spend half a day in an orientation session that is conducted by the human resources department, where you complete paperwork and receive a company handbook. Then you spend the rest of the day with your supervisor, who gives you a tour, introduces you to your co-workers, and explains your first project. After that, you begin working and getting to know the others in the company. You find that in most respects, your experience fits your expectations, but in some ways you are surprised by realities that you hadn't expected. None of these surprises is too difficult to accept, so you eventually begin to feel at home and happy with your new job. When you begin to notice things that are not as you expected, you are in the ________ stage of socialization. encounter post-arrival orientation prearrival metamorphosis Read Article B.In the early days of arctic exploration, dogsled was often the only way to travel. The ice, snow, and extremely cold weather made using other animals, such as horses, impossible. Snowmobiles were not invented yet. Most explorers journeyed by ship until the ice made it impossible to continue. Then, they would switch to dogsled. The dogs, working together, were a well-oiled machine that could cover long distances in the cold.Sled dogs needed to have long, warm coats to survive the arctic temperatures. They had to be fast and able to run for long distances while pulling a heavy load. Most importantly, they had to work together as a team. This made northern dogs, such as Siberian huskies and Alaskan malamutes, the best choices for the sled teams. These dogs have long coats, with a double layer of fur to keep out the cold, and they have wide paws with webbed toes that act like snowshoes. They have been bred for more than 9,000 years to be working dogs in extreme winter weather. They are friendly, team-oriented, and purposeful dogs. In the days of the arctic explorers, the physical features and determined personalities of the sled dogs made long journeys in harsh conditions possible.To be in the best condition for pulling heavy loads, the dogs needed a diet that was high in fat. They ate whale and seal blubber and fatty meats during their long journeys, which kept them strong and gave them energy to keep going. The dogs' paws also needed special care to make sure that they did not become injured by sharp ice or extreme cold. Treating the paws with fat or wax helped the dogs to run safely and comfortably.Although the days of arctic explorers are long past, sled dogs continue to run through the snow and ice of the North. Dogsledding is now recognized as a sport, with many competitions taking place all over the world. One of the most well-known of these is the Iditarod, a race of almost 1,000 miles. It commemorates the Great Race of Mercy that took place in 1925 when dog sled teams were the only hope of a town that needed life-saving medicine. The race takes 811 days to complete and is run regardless of weather conditions. Teams of twelve or more dogs train with their handlers for years before competing. The race is long and one of the most challenging in the world. Dogs and their handlers must be in top physical condition to have any chance of winning.During the race, the dogs get multiple rest stops and are checked by veterinarians to make sure they avoid injuries. They eat high-fat, high-protein foods to give them the energy to continue, just like the dogs of the arctic explorers did. With the same determination that drove the dogs of the 1925 Great Race of Mercy, the dogs competing in the Iditarod run through even the worst blizzards and race to win.Which information would disprove the author's point that sled dogs need a long coat? Long coats keep the dog's abdomen and legs warm in extreme temperatures. Long coats get matted with ice and mud, making it difficult to keep clean. Long coats act as insulating blankets, making the dogs kennels a safe temperature. Long coats are easy to care for since the dogs shed their coats when it is warm. (Q014) Silicates a. are classified on the basis of what kind of metals they contain. b. form through the evaporation of water. c. are a large category of minerals that includes the common minerals calcite and dolomite. d. have the silicon-oxygen tetrahedron as their structural unit. What is equivalent to 1/6 Why should you think of your rsum as a marketing document? Does the verbal description c minus 12 Which of the following expressions is equal to tan205?tan55tan25tan25 Find in slope intercept form the equation of the line parallel to y + 5x = 2 and passing through the point (-1, 4) A physical count of merchandise inventory on July 30 reveals that there are 180 units on hand. Using the FIFO inventory method, the amount allocated to ending inventory for July is cht xm trong trung ng thn kinh c cu to t u A technology company starts a program dedicated to training high school students in the use of the latest computer programming languages. How can the company justify creating and funding such a program since it is not about its primary products What distance was covered by the bicycle during the 10 seconds? what function represents exponential decay?