Securing DNS Zones
1. Your organization's network needs to be accessible to customers, creating a possible security risk. From the e-Activity, choose the three (3) approaches you believe a potential attacker is most likely to take in order to access and modify your network's DNS zones or records. Support your choices.
2. Using your three (3) previous choices and the e-Activity, determine which available procedures will provide the greatest defense against those attack approaches. Provide a rationale for each of the choices.