In an attack known as ____, valid protocol packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on that network.
A. denial-of-service (DoS)
B. DNS cache poisoning
C. port mirroring
D. evasion
Answer: B
You might also like to view...
Which of the following statements is true about the use of light in spaces? Select all that apply.
A) Warm sources would be good in a fast food restaurant. B) Warm white light is preferred for sources used at low light levels. C) Cool sources are preferred for high light levels. D) Cool sources would be good in an elegant restaurant.
The match of the motor and compressor inside a hermetic compressor:
A) Is typically 1 hp per ton for nearly all applications. B) Is specific for the application of the compressor. C) Is generally not critical, allowing a single compressor to cover a wide range of applications. D) Is made in the field by the installing technician.
Water in a closed container can boil at room temperature if:
A. Enough pressure is removed from the surface of the water. B. Enough pressure is a applied to the surface of the water. C. Enough heat is removed from the water. D. Superheated
With a centralized hydronic heating system, cost allocation is handled by measuring the total thermal energy transferred to each space on a periodic (usually monthly) basis. This approach is called heat metering, or, more commonly in North America “____.”
a. climate control c. shared metering b. BTU Metering d. central bookkeeping