Not exactly. What you could try though is enable application telemetry to collect application usage data (this enables netflow on your cat9k access switches). Then, in Client 360, use the time travel slider to approximately match to the time frame of a DNS spike and see what the application usage was like during the spike. If you see a similar pattern over a few spikes, then that probably gives you a good clue about what application is responsible for the queries.
Feel free to use the Make a Wish feature in the help menu to ask for DNS reporting in a future release. Perhaps if you had something like Stealthwatch there would be more to look at there, since its more specifically designed as a security tool.