PdfPrep.com

Which of the following commands should the security analyst use?

A security analyst is testing both Windows and Linux systems for unauthorized DNS zone transfers within a LAN on comptia.org from example.org.

Which of the following commands should the security analyst use? (Choose two.)
A .


B .

C . dig Caxfr comptia.org @example.org
D . ipconfig /flushDNS
E .

F . dig @example.org comptia.org

Answer: AC

Exit mobile version