The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.

a. cybersquatting.
b. phishing.
c. an online imposture.
d. cache poisoning.
e. a distributed denial of request.


Answer: d. cache poisoning.

Computer Science & Information Technology

You might also like to view...

A switch statement must have

a. a default case b. more than one non-default case c. a break statement d. none of the above e. all of the above

Computer Science & Information Technology

The integrity of the data in a table can be checked by using queries that count the instance of certain fields to determine if the same record appears twice in a table

Indicate whether the statement is true or false

Computer Science & Information Technology

____________________ buttons, also known as rollovers, are navigation graphics that change appearance when a visitor interacts with them.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you wish to pass on or re-send an email message to other individuals, you should use the ________ option.

A. bcc B. attachment C. reply D. forward

Computer Science & Information Technology