New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CFA-001 Exam - Topic 3 Question 83 Discussion

Actual exam question for GAQM's CFA-001 exam
Question #: 83
Topic #: 3
[All CFA-001 Questions]

Jason, a renowned forensic investigator, is investigating a network attack that resulted in the compromise of several systems in a reputed multinational's network. He started Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets travelling across the network belonged to a non-company configured IP. Which of the following attack Jason can infer from his findings?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Buffy
3 months ago
Wow, I didn’t realize how easily DNS can be compromised!
upvoted 0 times
...
Johnetta
3 months ago
Wait, are we sure it’s not just a misconfiguration?
upvoted 0 times
...
Natalie
3 months ago
I thought DNS Redirection was more common in these cases?
upvoted 0 times
...
Lemuel
4 months ago
Definitely, those non-company IPs are suspicious!
upvoted 0 times
...
Venita
4 months ago
Sounds like DNS Poisoning to me.
upvoted 0 times
...
Tashia
4 months ago
I’m a bit confused, though. Couldn’t it also be a Cookie Poisoning Attack? I just can’t recall the specifics on that one.
upvoted 0 times
...
Darell
4 months ago
This reminds me of a practice question we did on network attacks. I think the focus on DNS packets really points towards DNS Poisoning.
upvoted 0 times
...
Ryan
4 months ago
I'm not entirely sure, but I feel like DNS Redirection might also fit here since it involves redirecting traffic to a different IP.
upvoted 0 times
...
Krissy
5 months ago
I remember studying DNS attacks, and I think DNS Poisoning could be the right answer since it involves altering DNS records.
upvoted 0 times
...
Brandon
5 months ago
This is a tricky one. I'm not entirely confident, but I'm going to go with DNS Poisoning. The non-company IP address seems like the biggest clue here.
upvoted 0 times
...
Glory
5 months ago
Okay, let's see. The key details are the non-company IP and the DNS packets. I think DNS Poisoning is the most logical choice, but I'll double-check the other options just to be sure.
upvoted 0 times
...
Avery
5 months ago
This seems like a straightforward DNS-related attack based on the information provided. I'm leaning towards DNS Poisoning as the most likely answer.
upvoted 0 times
...
Lamonica
5 months ago
Hmm, I'm a bit unsure here. The question mentions non-company configured IP, so it could also be a DNS Redirection attack. I'll need to think this through carefully.
upvoted 0 times
...
Janet
5 months ago
I'm pretty sure this is asking about the types of BIOC rules available in Cortex XDR. I think the answer is B. Discovery, since that's one of the main categories of BIOC rules.
upvoted 0 times
...
Myra
5 months ago
I think the key here is that the question is asking if it's possible, not whether it's recommended. Based on that, I'd say option B is the correct answer - you can do image automation outside of Citrix, but it should be a last resort.
upvoted 0 times
...
Maryrose
9 months ago
Ha! This reminds me of that time I accidentally spilled coffee on my laptop and had to use the office toaster as a makeshift router. Good times, good times.
upvoted 0 times
Jose
8 months ago
D) Session poisoning
upvoted 0 times
...
Valentine
8 months ago
C) DNS Redirection
upvoted 0 times
...
Lang
8 months ago
B) Cookie Poisoning Attack
upvoted 0 times
...
Isabelle
9 months ago
A) DNS Poisoning
upvoted 0 times
...
...
Dierdre
10 months ago
Ooh, this is a tough one. I'm gonna go with D - Session poisoning. Gotta love it when the bad guys try to hijack your online sessions. Bet Jason's got his work cut out for him on this one.
upvoted 0 times
Pearly
8 months ago
C) DNS Redirection
upvoted 0 times
...
Ryan
9 months ago
B) Cookie Poisoning Attack
upvoted 0 times
...
Mirta
9 months ago
A) DNS Poisoning
upvoted 0 times
...
Fletcher
9 months ago
C) DNS Redirection
upvoted 0 times
...
Noel
10 months ago
B) Cookie Poisoning Attack
upvoted 0 times
...
Donte
10 months ago
A) DNS Poisoning
upvoted 0 times
...
...
Lynelle
10 months ago
Gotta be B - Cookie Poisoning Attack, right? I mean, who doesn't love a good old-fashioned cookie heist? The hackers are really getting creative these days.
upvoted 0 times
...
Gerry
10 months ago
Hmm, this one's tricky. I'm gonna go with A - DNS Poisoning. Messing with the DNS? Classic move. Bet the IT team's got their hands full trying to clean up this mess.
upvoted 0 times
Goldie
8 months ago
Maybe they exploited a vulnerability in the system to launch the attack.
upvoted 0 times
...
Gail
8 months ago
I wonder how the attacker gained access to the network in the first place.
upvoted 0 times
...
Antonio
9 months ago
Yeah, it's a sneaky way to redirect users to malicious websites.
upvoted 0 times
...
Stephaine
10 months ago
I think you're right, DNS Poisoning is a common attack method.
upvoted 0 times
...
...
Stanton
10 months ago
Ah, a classic DNS attack! This one's a real head-scratcher. Let's see, I'd say the answer is C - DNS Redirection. Gotta love it when the hackers try to play hide-and-seek with the corporate network, eh?
upvoted 0 times
...
Aleta
10 months ago
I'm not sure, but DNS Redirection could also be a possibility, right?
upvoted 0 times
...
Franchesca
10 months ago
I agree with Quentin, DNS Poisoning makes sense given the non-company configured IP.
upvoted 0 times
...
Quentin
10 months ago
I think the attack could be DNS Poisoning.
upvoted 0 times
...

Save Cancel