The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.
a. cybersquatting.
b. phishing.
c. an online imposture.
d. cache poisoning.
e. a distributed denial of request.
Answer: d. cache poisoning.
You might also like to view...
A switch statement must have
a. a default case b. more than one non-default case c. a break statement d. none of the above e. all of the above
The integrity of the data in a table can be checked by using queries that count the instance of certain fields to determine if the same record appears twice in a table
Indicate whether the statement is true or false
____________________ buttons, also known as rollovers, are navigation graphics that change appearance when a visitor interacts with them.
Fill in the blank(s) with the appropriate word(s).
If you wish to pass on or re-send an email message to other individuals, you should use the ________ option.
A. bcc B. attachment C. reply D. forward