InterviewSolution
Saved Bookmarks
| 1. |
_____________ can be attained by the use of malware or by changing the server’s settings.(a) DNS poisoning(b) DNS cracking(c) DNS hijacking(d) DNS redirectingThis question was addressed to me in final exam.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT choice is (c) DNS hijacking For explanation I would say: DNS hijacking is a form of nasty online attack in which a user gets redirects QUERIES to a DNS because of OVERRIDE of system’s TCP/IP settings. It can be attained by the use of MALWARE or by changing the server’s settings. |
|