A security consultant is conducting a network assessment and wishes to discover any legacy backup Internet
connections the network may have. Where would the consultant find this information and why would it be
valuable?
A.
This information can be found in global routing tables, and is valuable because backup connections typically
do not have perimeter protection as strong as the primary connection.
B.
This information can be found by calling the regional Internet registry, and is valuable because backup
connections typically do not require VPN access to the network.
C.
This information can be found by accessing telecom billing records, and is valuable because backup
connections typically have much lower latency than primary connections.
D.
This information can be found by querying the network’s DNS servers, and is valuable because backup
DNS servers typically allow recursive queries from Internet hosts.