Joe a system administrator receives reports that users attempting to reach the corporate website are arriving at an unfamiliar website instead. An investigation by a forensic analyst found that the name server log has several corporate IP addresses that were changed using Joe's credentials. Which of the following is this attack called?
A. Xmas attack
B. DNS poisoning
C. Web server attack
D. Spoofing attack
Answer: B. DNS poisoning
Computer Science & Information Technology
You might also like to view...
Creative Commons states that you should use an appropriate tool for the type of communication in which you are participating
Indicate whether the statement is true or false
Computer Science & Information Technology
In Microsoft Excel Charts, a _________ is the range that contains the data to display in a chart.? A. data type B. chart area C. chart element D. data source
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology