A security analyst is testing both Windows and Linux systems for unauthorized DNS zone transfers within a LAN on comptia.org from example.org. Which of the following commands should the security analyst use? (Select two.)
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
F. Option F