1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
4 years ago
12

Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att

acker to redirect targets to malicious webservers. C. It allows an attacker to remotely controle your computer. D. It affects any clients querying the poisoned DNS server.
Computers and Technology
1 answer:
larisa [96]4 years ago
4 0

Answer:

(B) It allows an attacker to redirect targets to malicious webserver.

(D) It affects any clients querying the poisoned DNS server.

Explanation:

DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.

Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.

The computer browser then get to the intended website through the IP address.

Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.

Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.

Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.

You might be interested in
If given program is executed, what will be output?
iogann1982 [59]

Answer:

16 22 399 214 351

Explanation:

es 1 .22 399 480

3 0
2 years ago
Which column and row references are updated when you copy the formula f$3/15
Tasya [4]

Answer: Column F

Explanation: In Microsoft excel, for the sake of robustness and to aid the effectiveness of updating formulas across cells. The reference of cells are treated as relative which means that when formulas are copied across columns or within rows, they get updated automatically. However, some numbers may be treated as constants such that we do not want them to change or be updated as we move acisss cells. Thus, such numbers are treated Given absolute references, which is made possible by adding a '$' prefix before the colum alphabet or row number or both. in the scenario given above, the row has the $ prefix, hence, it is absolute and will not change but the column alphabet does not and hence, treated as relative.

3 0
3 years ago
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
Hunter-Best [27]

Answer:

Bayesian filtering

Explanation:

This is a type of filtering software that makes use of Bayesian logic to evaluate every incoming email that you receive, analyzing the header and content of the email to determinate if it is spam or not. It uses a preset of common words that are present in most spam emails, and it categorizes all received emails according to their probability to contain spam in trusted, or not trusted email. These categories are usually set by the user.

In short, Bayesian logic uses the knowledge acquired from past events to try to predict future events. Determinate the probability of success (from 0 to 100%) of a certain activity, according to the result of prior tests. It was first suggested in 1763 after the death of its creator Thomas Bayes, and it is widely spread across several different sciences such as programming, artificial intelligence, physics, etc.

6 0
4 years ago
Networking device converts analog signals to digital ones?
iren2701 [21]

Solution:

An analog-to-digital converter, or ADC as it is more commonly called, is a device that converts analog signals into digital signals. Analog information is transmitted by modulating a continuous transmission signal by amplifying a signal's strength or varying its frequency to add or take away data.

This is the required answer.

5 0
3 years ago
Subtraction of matrix​
Flura [38]

Answer:

A matrix can only be added to (or subtracted from) another matrix if the two matrices have the same dimensions.

Explanation:

Subtracting matrices Similarly, to subtract matrices, we subtract the corresponding entries. For example, let's consider C = [ 2 8 0 9 ] C=\left[\begin{array}{rr}{2} &8 \\ 0 & 9 \end{array}\right] C=[2089] and D = [ 5 6 11 3 ] D=\left[\begin{array}{rr}{5} &6 \\ 11 & 3 \end{array}\right] D=[51163].

8 0
3 years ago
Other questions:
  • Answers please !!!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • When talking about the physical elements of the internet, the term redundancy refers to:?
    13·1 answer
  • 1. Extract title Write a function extract_title that takes one parameter, the filename of a GenBank formatted file, and returns
    14·1 answer
  • What type of software is responsible for managing processor time and memory allocation?
    7·1 answer
  • After Lola gave her friend the password to a protected website, her friend was able to remember it only long enough to type it i
    7·1 answer
  • Que es un programa de ordenador?
    10·1 answer
  • Where do you place the logical test argument in an IF function formula?
    6·2 answers
  • Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​
    8·2 answers
  • A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either send
    13·1 answer
  • You have been asked to advise a group of several universities who want to combine research efforts and store data in the cloud.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!