This attack exploits vulnerabilities in DNS and directs internet traffic away from the intended server to a fake server.

What will be an ideal response?

DNS poisoning

Computer Science & Information Technology

You might also like to view...

A(n) ______ is a saved link to a webpage.

A. bookmark B. shortcut C. favorite D. All of the above

Computer Science & Information Technology

?The Android project folder that contains images, music, and video files required by the application is called media.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology