Suppose an attacker finds a way to store an arbitrary binding in your local DNS server. How can the attacker use such a weakness to obtain your bank account information?
What will be an ideal response?
In doing so an attacker can direct a user from a legitimate address (correct bank address) to an
incorrect/fake address and when the user enters personal/account information, they can be
captured/stored and later be used to access user’s actual bank account to make transaction.
You might also like to view...
Only visible data is a table is used by the SUBTOTAL function in calculating results
Indicate whether the statement is true or false
Which of the following is a difference between a Norton firewall and a McAfee personal firewall?
a. A Norton firewall is easy to use whereas a McAfee personal firewall is not easy to use. b. A Norton firewall can block outbound traffic whereas a McAfee personal firewall cannot block outbound traffic. c. A Norton firewall can allows you to scan your system for vulnerabilities whereas a McAfee personal firewall does not have this option. d. A Norton firewall is free whereas a McAfee personal firewall is a commercial product.