Joe a system administrator receives reports that users attempting to reach the corporate website are arriving at an unfamiliar website instead. An investigation by a forensic analyst found that the name server log has several corporate IP addresses that were changed using Joe's credentials. Which of the following is this attack called?

A. Xmas attack
B. DNS poisoning
C. Web server attack
D. Spoofing attack

Answer: B. DNS poisoning

Computer Science & Information Technology

You might also like to view...

Creative Commons states that you should use an appropriate tool for the type of communication in which you are participating

Indicate whether the statement is true or false

Computer Science & Information Technology

In Microsoft Excel Charts, a _________ is the range that contains the data to display in a chart.? A. data type B. chart area C. chart element D. data source

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology