Joe a system administrator receives reports that users attempting to reach the corporate website are arriving at an unfamiliar website instead. An investigation by a forensic analyst found that the name server log has several corporate IP addresses that were changed using Joe's credentials. Which of the following is this attack called?

A. Xmas attack
B. DNS poisoning
C. Web server attack
D. Spoofing attack


Answer: B. DNS poisoning

Computer Science & Information Technology

You might also like to view...

If you discover that you should not have deleted the file, you can recover it by opening the ____ icon on the desktop and right-clicking the file you want to restore.

A. Empty Bin B. Recycle Bin C. Delete Bin D. Windows Clipboard

Computer Science & Information Technology

Assume StringBuilder strBuf is "ABCDEFG", after invoking _________, strBuf contains "ABCRRRRDEFG".

a. strBuf.insert(1, "RRRR") b. strBuf.insert(2, "RRRR") c. strBuf.insert(3, "RRRR") d. strBuf.insert(4, "RRRR")

Computer Science & Information Technology

Users generally don’t mind a lot of clicks as long as they feel like they’re following the __________.

a. prominent links b. “scent of information” c. most popular choice

Computer Science & Information Technology

A(n) ____________________ chart uses bars of varying heights to illustrate values in a worksheet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology