Question: An IT security manager is tasked with enhancing the DNS security posture of their organization to protect against recent increases in DNS spoofing and poisoning
An IT security manager is tasked with enhancing the DNS security posture of their organization to protect against recent increases in DNS spoofing and poisoning attacks.
The organization's network includes a mix of corporate devices and BYOD Bring Your Own Device policies, with employees frequently accessing the network remotely. The IT security manager is considering several options to secure the organization's DNS queries and responses.
Which of the following options should the IT security manager prioritize to best secure the organization's DNS infrastructure while accommodating the diverse network environment?
answer
Implement DNS over HTTPS DoH for all devices.
Combine the deployment of DNSSEC for DNS servers with the implementation of DNS over HTTPS DoH for all devices.
Enforce the use of a Virtual Private Network VPN for all remote and BYOD connections.
Deploy DNS Security Extensions DNSSEC across the organization's DNS servers.
The correct answer is to combine the deployment of DNSSEC for DNS servers with the implementation of DNS over HTTPS DoH for all devices. Combining DNSSEC and DoH offers a comprehensive approach to DNS security. DNSSEC ensures the authenticity and integrity of DNS responses, protecting against spoofing and poisoning attacks. DoH encrypts DNS queries, safeguarding them from interception and tampering, especially important for BYOD and remote access scenarios. This combination addresses both the validation of DNS responses and the encryption of DNS queries, providing a robust security posture for the organization's diverse network environment.
While implementing DoH secures DNS queries by encrypting them, it does not ensure the authenticity of DNS responses. Alone, it might not fully protect against DNS spoofing and poisoning attacks.
Deploying DNSSEC enhances the security of DNS responses by ensuring their authenticity and integrity. However, it does not encrypt DNS queries, leaving them potentially vulnerable to interception, especially in BYOD and remote access scenarios.
Enforcing the use of a VPN can secure all traffic from remote and BYOD devices, but it does not specifically address the security of DNS queries and responses within the organization's network. Additionally, VPN usage alone does not protect against DNS spoofing and poisoning attacks.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
