Which of the following technique is used by the attacker?

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.

Which of the following technique is used by the attacker?
A . DNS zone transfer
B . Dynamic DNS
C . DNS interrogation
D . Fast-Flux DNS

Answer: D

Latest 312-85 Dumps Valid Version with 49 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments