you are assigned to hunt for traces of a dangerous dns attack in a network. you need to capture dns attacks that can compromise the command-and-control activities of all devices in the network. what type of dns attack should you look for?