1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
4 years ago
12

Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att

acker to redirect targets to malicious webservers. C. It allows an attacker to remotely controle your computer. D. It affects any clients querying the poisoned DNS server.
Computers and Technology
1 answer:
larisa [96]4 years ago
4 0

Answer:

(B) It allows an attacker to redirect targets to malicious webserver.

(D) It affects any clients querying the poisoned DNS server.

Explanation:

DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.

Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.

The computer browser then get to the intended website through the IP address.

Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.

Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.

Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.

You might be interested in
What are the steps to open the Custom AutoFilter dialog box?
uranmaximum [27]

Answer:

data, sort and filter, text filters

Explanation:

ed 2020

7 0
3 years ago
Read 2 more answers
Can anybody do Algorithm 2 for me (with Python).<br> Answer = 25 points.
Nostrana [21]

Answer:

age=int(input("Enter age"))

if age>=18:

    print("You are Young")

else

   print("You are child")

Explanation:

if you have any query or any problem kindly ask in comment

5 0
3 years ago
To differentiate the absolute pathnames to files that are located on different drives, html requires you to include the drive le
Ber [7]
<span>To differentiate the absolute pathnames to files that are located on different drives, HTML requires you to include the drive letter followed by a </span>vertical bar.
4 0
3 years ago
What is the effect of block size in cache design?
Sedaia [141]

Answer:

When designing a cache, you have to consider this things:

  • Delay.
  • Miss rate.
  • Area.

If the cache has a bigger block size may have a lower delay, but when miss the miss rate will be costly. If an application has high spatial locality a bigger block size will do well, but programs with poor spatial locality will not because a miss rate will be high and seek time will be expensive.

5 0
3 years ago
The location on the Word screen where text will be entered is known as the _____.
mixas84 [53]
Insertion point is represented by blinking vertical line
4 0
3 years ago
Other questions:
  • Explain the difference between an i/o‐bound process and a cpu‐bound process.
    12·1 answer
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • Which of the following terms describes surgery through a small incision in the abdomen?
    11·1 answer
  • What is the benefit to displaying the merge codes in a document?
    9·1 answer
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • William found out that someone used his report on American culture without his permission. What is William a victim of? A. plagi
    7·2 answers
  • After you select a cell with an error indicator, you can click the error checking _______ to display additional information abou
    14·1 answer
  • The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
    14·1 answer
  • When writing code, how can printing be useful?
    15·1 answer
  • What is a hardware device that allows you to connect to several computers and other devices to a single internet connection
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!