An employee attempts to go to a well-known bank site using the company-standard web browser by correctly typing in the address of the site into the web browser. The employee is directed to a website that looks like the bank's site but is not the actual bank site. The employee's user name and password are subsequently stolen. This is an example of which of the following?

A. Watering hole attack
B. Cross-site scripting
C. DNS poisoning
D. Man-in-the-middle attack


Answer: C. DNS poisoning

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. In Emacs, deleting text or killing text means the same thing. 2. One way to exit Emacs is to turn the terminal off. 3. Point and Mark are used to indicate the boundaries of the section (region) of the ext to be rearranged. 4. While in Emacs, you can open more than one file. 5. The commands for search forward and backward for occurrences of a specified text are [Ctrl-s] and [Ctrl-r] accordingly.

Computer Science & Information Technology

Output devices are used to enter data for processing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Layout gallery displays 10 slide layouts with a variety of placeholders to define text and content positioning and formatting.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ is included by default with Windows Server 2008 and is the sole location for managing all aspects of group policy

a. Active Directory Users and Computers b. Group Policy Server Manager c. Role Manager d. Group Policy Management Console

Computer Science & Information Technology