1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
2 years ago
11

A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici

ous IP address. What type of attack did the hacker perform
Computers and Technology
1 answer:
balu736 [363]2 years ago
7 0

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

You might be interested in
Which of the following does a code editor NOT provide?
qwelly [4]

Answer:

A- highlighting

Explanation:

plain code editor's don't provide them hope this helps

5 0
3 years ago
What is a risk or an effect of software piracy?
Butoxors [25]
Piracy is a term used to describe the practice of obtaining or using software in a manner that is illegal or not in keeping with the terms under which the software was distributed. This can range from purchasing or copying the software, to using the software without a license, to selling, renting, or otherwise distributing it without authorization.<span>The Business Software Alliance estimated the losses to software companies in 2005 as a result of piracy at over $30 billion.</span>
5 0
4 years ago
Read 2 more answers
A 'deny any-any' rule in a firewall ruleset is normally placed: a. Nowhere in the ruleset if it has a default allow policyb. Bel
tia_tia [17]

Answer:

D. . At the bottom of the ruleset

Explanation:

The main purpose of firewalls is to drop all traffic that is not explicitly permitted. As a safeguard to stop uninvited traffic from passing through the firewall, place an any-any-any drop rule (Cleanup Rule) at the bottom of each security zone context

6 0
4 years ago
Suppose a raptor center has 9 owls and 12 hawks. What percent of these birds are hawks? Round your answer to the nearest whole p
Andrews [41]
Givghjn gujbfuj. Gunghiyvb cvcybv
5 0
4 years ago
A _______ is smaller than a notebook or laptop and has a touchscreen and sometimes a pointing device.
inysia [295]
Tablet (such as iPad, surface), smart phone (such as iphone7 plus and samsung S8)
6 0
4 years ago
Other questions:
  • Ann wants to create a bookmark. She should
    9·2 answers
  • What 2 major agricultural inventions did jethro tull create?
    10·2 answers
  • Create a GUI application that allows the user to select a rate category (from a set of radio buttons), and enter the number of m
    6·1 answer
  • Clarisse is setting the white spaces at the edge of her Word document to be 1 inch. She is setting the _____.
    7·1 answer
  • Imagine that a time machine has transported you back to an earlier civilization or historical era. Poking through your backpack,
    12·1 answer
  • As a basic user of SAP Business One, which feature of the application do you like most? Elaborate on your answer.
    15·1 answer
  • Give short answers.
    14·1 answer
  • Gavin is making a new logo for his business. He uses drawing software to create a unique. Which file format does he use to creat
    5·1 answer
  • V. ASSESSMENT (Time Frame:
    7·1 answer
  • How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!