It is possible for the DNS server to be attacked, an intrusion called DNS ____.

A. poisoning
B. spoofing
C. phishing
D. cracking


Answer: A

Computer Science & Information Technology

You might also like to view...

What is the purpose of having a model for investigations? How does it help the investigator or the student learning to be an investigator?

What will be an ideal response?

Computer Science & Information Technology

The project calendar is also called the ____________________ calendar.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

One of the disadvantages of qualitative risk analysis is that all results are subjective

Indicate whether the statement is true or false.

Computer Science & Information Technology

For m-commerce to work effectively, the interface must be so good that it is nearly as easy to make a purchase on a ____ device as it is on a laptop or desktop computer. ?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology