How would the security manager address this problem?

The security team for Company XYZ has determined that someone from outside the organization

has obtained sensitive information about the internal organization by querying the external DNS
server of the company. The security manager is tasked with making sure this problem does not
occur in the future. How would the security manager address this problem?

The security team for Company XYZ has determined that someone from outside the organization

has obtained sensitive information about the internal organization by querying the external DNS
server of the company. The security manager is tasked with making sure this problem does not
occur in the future. How would the security manager address this problem?

A.
Implement a split DNS, only allowing the external DNS server to contain information about
domains that only the outside world should be aware, and an internal DNS server to maintain
authoritative records for internal systems.

B.
Implement a split DNS, only allowing the external DNS server to contain information about
internal domain resources that the outside world would be interested in, and an internal DNS
server to maintain authoritative records for internal systems.

C.
Implement a split DNS, only allowing the external DNS server to contain information about
domains that only the outside world should be aware, and an internal DNS server to maintain nonauthoritative records for external systems.

D.
Implement a split DNS, only allowing the internal DNS server to contain information about
domains the outside world should be aware of, and an external DNS server to maintain
authoritative records for internal systems.



Leave a Reply 0

Your email address will not be published. Required fields are marked *