1.

_____________ can be attained by the use of malware or by changing the server’s settings.(a) DNS poisoning(b) DNS cracking(c) DNS hijacking(d) DNS redirectingThis question was addressed to me in final exam.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer» CORRECT choice is (c) DNS hijacking

For explanation I would say: DNS hijacking is a form of nasty online attack in which a user gets redirects QUERIES to a DNS because of OVERRIDE of system’s TCP/IP settings. It can be attained by the use of MALWARE or by changing the server’s settings.


Discussion

No Comment Found

Related InterviewSolutions