How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

A. DNS poisoning
B. Phishing
C. DNS marking
D. DNS overloading


Answer: A

Computer Science & Information Technology

You might also like to view...

LCD stands for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

It is easy for a Web browser to detect whether a particular Web page contains embedded JavaScript code. The person who creates the document should use the tag to mark the beginning of a JavaScript section.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ takes a current snapshot of the security of the organization as it now stands.

A. Asset modeling B. Asset tree C. Threat modeling D. Vulnerability appraisal

Computer Science & Information Technology

Data is the main ingredient for any BI, data science, and business analytics initiative.

Indicate whether the statement is true or false.

Computer Science & Information Technology