adplus-dvertising
frame-decoration

Question

In case a zone transfer is not possible, how can DNS information still be gathered?

a.

By sending a DNS query for each IP address

b.

By brute force attack on the DNS server

c.

By exploiting DNS vulnerabilities

d.

By intercepting DNS traffic

Answer: (a).By sending a DNS query for each IP address Explanation:If a zone transfer is not possible, DNS information can still be gathered by sending a DNS query for each IP address that the organization uses, thus creating a useful list of systems.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In case a zone transfer is not possible, how can DNS information still be gathered?

Similar Questions

Discover Related MCQs

Q. What can be determined by looking up the IP range of a system?

Q. How can traceroute be useful for a penetration tester?

Q. What is the process of scanning for wireless networks while mobile, often in a car?

Q. Which of the following databases is an open wireless network database?

Q. What is the purpose of public BGP route information servers known as BGP looking glasses?

Q. What is wardriving?

Q. What is the purpose of security search engines like Shodan and Censys?

Q. How can penetration testers use the Google Hacking Database (GHDB) for information gathering?

Q. What is the purpose of sites like haveibeenpwned.com and tools like pwnedOrNot?

Q. Why are source code repositories like GitHub important for penetration testers?

Q. What challenge do penetration testers face in passive enumeration tasks for cloud and hosted services?

Q. What infrastructure as code tools are generating useful code for penetration testers?

Q. What is the primary goal of active reconnaissance in the penetration testing process?

Q. What is a common method for enumerating hosts on a network in active reconnaissance?

Q. What information can DHCP server logs provide in the context of active reconnaissance?

Q. What is the purpose of service identification in active reconnaissance?

Q. What is a common feature of port scanning tools used in active reconnaissance?

Q. What are ports 0–1023 commonly known as in the context of port scanning?

Q. How is service identification typically done in active reconnaissance?

Q. What is the purpose of operating system fingerprinting in reconnaissance?