A security consultant is conducting a network assessment and wishes to discover any legacy backup Internet connections the network may have. Where would the consultant find this information and why would it be valuable?
A . This information can be found in global routing tables, and is valuable because backup connections typically do not have perimeter protection as strong as the primary connection.
B . This information can be found by calling the regional Internet registry, and is valuable because backup connections typically do not require VPN access to the network.
C . This information can be found by accessing telecom billing records, and is valuable because backup connections typically have much lower latency than primary connections.
D . This information can be found by querying the network’s DNS servers, and is valuable because backup DNS servers typically allow recursive queries from Internet hosts.
Answer: A
Leave a Reply