You haven't described the parameters of the exercise enough to make answering in a way that's acceptable to your instructor apparent. I'll take a stab for fun ('cuz, ya' know, I like answering questions for fun), though.
Presumably, since you mentioned "domains", you have three DNS servers hosting Active Directory-integrated DNS zones. These three DNS servers must be members of domains hosted in separate AD forests, since there are implicit trust relationships between domains in the same forest. To achieve the "we can not access from one domain to the other two" criteria we'll assume three separate forests with one domain in each.
I'd add a fourth machine, not domain-joined, running the DNS Server service. I'd configure that machine with standard secondary DNS zones for each of the three DNS zones hosted by the three domain-joined DNS servers. In each of the domain-joined DNS servers I'd add the IP address of this fourth machine as a secondary DNS server and make sure that the zone transfer permission was such that it could zone transfer (which I'd probably test with nslookup
on the fourth machine, just to be sure it worked).
This fourth machine would be an authoritative DNS server for the DNS zones hosted by the three domain-joined DNS servers but would not require any communication between the three domain-joined DNS servers and no trust relationships between the domains (since you're doing all of this over the DNS protocol).
In the "we can not access from one domain to the other two" vein, you could even get all crazy with the firewall rules, if you wanted to, since all the communication between the servers, in this scenario, would be TCP/UDP port 53 traffic.