which among the following would be appropriate?

Study the log given in the exhibit,

Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall
rules, which among the following would be appropriate?

Study the log given in the exhibit,

Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall
rules, which among the following would be appropriate?

A.
Disallow UDP 53 in from outside to DNS server

B.
Allow UDP 53 in from DNS server to outside

C.
Disallow TCP 53 in form secondaries or ISP server to DNS server

D.
Block all UDP traffic

Explanation:
You only want your or your ISP’s outside DNS to be able to contact your inside
DNS. All other traffic should be directed against the outside DNS.



Leave a Reply 7

Your email address will not be published. Required fields are marked *


abu

abu

hello, can you verify this question? you have it repeated in previous version but the answer is different, so I was wondering which was the correct answer. Thanks

abu

abu

also, I wanted to know if these questions are actually some of the same questions that appear on the actual exam. Im taking the CEHv8 in a few days and I appreciate the help.

Farce

Farce

Did you pass Abu?

Ashley

Ashley

I believe the correct answer is C.
Abu,how did your exam go?
I am taking CEHv8 in a couple days.

john

john

Hi, I don’t really get why answer B is correct. As far as i am concerned you should limit traffic from outside world to your internal DNS servers (allow only specified external dns e. your ISPs) and B states that you allow traffic from inside out…It doesn’t make any sense or I am missing something

t

t

I think the correct answer is C port scan was conducted on TCP port 53, so Zone transfer needs to be restricted.

None

None

Guys, bad news

If you search on Google this question’s title there is 4 results, 2 of them saying the correct answer is A and other 2 with B.

here are two examples:
-http://www.aiotestking.com/ec-council/which-among-the-following-would-be-appropriate/
-http://www.aiotestking.com/ec-council/precautionary-measures-to-prevent-this-attack-would-include-writing-firewall-rules-of-these-firewall-rules-which-among-the-following-would-be-appropriate/

So the best solution is go crying to a corner.