Based on the exhibit, what is the MOST likely explanation for the network traffic?
The affected host is not showing a large amount of internet-bound traffic, but its DNS behavior is highly unusual.
DNS query log excerpt: Host: CORP-LT-17 16:18:02 a9f3d1k2d.update-check.com A NXDOMAIN 16:18:03 b7p9q2s1n.update-check.com A NXDOMAIN 16:18:04 k8z1m4c7r.update-check.com A NXDOMAIN 16:18:05 u3n6t9x0v.update-check.com A NXDOMAIN 16:18:06 9q2m7a4p1.update-check.com A NXDOMAIN Proxy log excerpt: No corresponding HTTP or HTTPS sessions observed TTL observed: 60 seconds on all queries
Based on the exhibit, what is the MOST likely explanation for the network traffic?
The affected host is not showing a large amount of internet-bound traffic, but its DNS behavior is highly unusual.
Answer choices
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
DNS tunneling used for command-and-control or data transfer
The long random-looking subdomains, repeated NXDOMAIN responses, and lack of normal web traffic are consistent with malicious DNS-based communication.
ARP poisoning causing the host to redirect traffic to a rogue gateway
ARP poisoning would mainly affect local layer-2 behavior, not produce repeated suspicious DNS subdomain lookups with NXDOMAIN responses.
A browser cache synchronization feature repeatedly polling a cloud service
Legitimate synchronization usually generates consistent service traffic and valid endpoints, not random-looking subdomains and repeated failures.
A misconfigured static route sending all web traffic to the wrong subnet
A routing error would affect broader connectivity, but it would not specifically create this distinctive DNS query pattern.
Common exam trap
Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.
Technical deep dive
Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.
Related practice questions
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
Practise SY0-701 questions linked to Security+ social engineering questions.
Practise SY0-701 questions linked to Security+ cryptography.
Practise SY0-701 questions linked to Security+ IAM questions.
Practise SY0-701 questions linked to Security+ risk management questions.
Practise SY0-701 questions linked to Security+ incident response questions.
Practise SY0-701 questions linked to Security+ malware questions.
Practise SY0-701 questions linked to Security+ vulnerability management questions.
Practise SY0-701 questions linked to Security+ security operations questions.
Practise SY0-701 questions linked to Security+ zero trust questions.
Practise SY0-701 questions linked to Security+ authentication factors questions.
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
FAQ
CIDR notation defines the prefix length.
The correct answer is: DNS tunneling used for command-and-control or data transfer — The pattern is highly consistent with DNS tunneling or a DNS-based command-and-control channel. The subdomains are long and randomized, the requests mostly fail with NXDOMAIN, and there is no corresponding HTTP or HTTPS activity. Attackers often use DNS this way because it is widely allowed out of networks and can bypass traditional web filtering. The low TTL and repetitive structure further suggest automated beaconing rather than normal application behavior. Why others are wrong: ARP poisoning is a layer-2 attack and would not explain the specific DNS query pattern. A cloud sync client would normally contact known service endpoints and generate successful lookups, not repeated random subdomain failures. A bad static route could break connectivity, but it would not create a stream of structured DNS requests that look like encoded data or command traffic.
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Sign in to join the discussion.