Joe a system administrator receives reports that users attempting to reach the corporate website are arriving at an unfamiliar website instead. An investigation by a forensic analyst found that the name server log has several corporate IP addresses that were changed using Joe's credentials. Which of the following is this attack called?
A. Xmas attack
B. DNS poisoning
C. Web server attack
D. Spoofing attack
Answer: B. DNS poisoning
You might also like to view...
If you discover that you should not have deleted the file, you can recover it by opening the ____ icon on the desktop and right-clicking the file you want to restore.
A. Empty Bin B. Recycle Bin C. Delete Bin D. Windows Clipboard
Assume StringBuilder strBuf is "ABCDEFG", after invoking _________, strBuf contains "ABCRRRRDEFG".
a. strBuf.insert(1, "RRRR") b. strBuf.insert(2, "RRRR") c. strBuf.insert(3, "RRRR") d. strBuf.insert(4, "RRRR")
Users generally don’t mind a lot of clicks as long as they feel like they’re following the __________.
a. prominent links b. “scent of information” c. most popular choice
A(n) ____________________ chart uses bars of varying heights to illustrate values in a worksheet.
Fill in the blank(s) with the appropriate word(s).