セキュリティ アナリストは、パケット キャプチャを分析中に、次の不審な DNS トラフィックを発見しました。 * トンネリング セッションがアクティブな間の DNS トラフィック。 * クエリ間の平均時間は 1 秒未満です。 * クエリの平均長が 100 文字を超えています。 次の攻撃のうち、発生した可能性が最も高いのはどれですか?
正解:A
DNS exfiltration is a technique that uses the DNS protocol to transfer data from a compromised network or device to an attacker-controlled server. DNS exfiltration can bypass firewall rules and security products that do not inspect DNS traffic. The characteristics of the suspicious DNS traffic in the question match the indicators of DNS exfiltration, such as: DNS traffic while a tunneling session is active: This implies that the DNS protocol is being used to create a covert channel for data transfer. The mean time between queries is less than one second: This implies that the DNS queries are being sent at a high frequency to maximize the amount of data transferred. The average query length exceeds 100 characters: This implies that the DNS queries are encoding large amounts of data in the subdomains or other fields of the DNS packets. Official Reference: https://partners.comptia.org/docs/default-source/resources/comptia-cysa-cs0-002-exam-objectives https://resources.infosecinstitute.com/topic/bypassing-security-products-via-dns-data-exfiltration/ https://www.reddit.com/r/CompTIA/comments/nvjuzt/dns_exfiltration_explanation/