1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
14

Choose the type of attack that is based on entering fake information into a target network domain name server?

Computers and Technology
1 answer:
SSSSS [86.1K]3 years ago
4 0

Answer:

DNS poisoning

Explanation:

DNS is a server service that verifies or resolves an IP address to a site or domain name. It's services is made available with a dhcp request from a client system, providing the ip address of the DNS server. The DNS server has the records of domain name linked to their individual ip addresses.

When an attacker wants a client to visit his site without knowing the site is not genuine, he gains access to the dns server and changes the information or poisons the entries of the server. So if the client tries to access that site, it takes him to the attackers site. This is called DNS poisoning.

You might be interested in
Read the following scenario:
hjlf

Answer ask fro elp

Explanation:

7 0
3 years ago
What happens when an exception is thrown, but the try statement does not have a catch clause that is capable of catching it?
Pavlova-9 [17]

Answer:

A checked exception indicates something beyond your control has gone wrong. ... If an exception does not have a matching catch clause, the current method terminates and throws the exception to the next higher level. If there is no matching catch clause at any higher level, then the program terminates with an error.

6 0
3 years ago
The processing is done in the​
Lady_Fox [76]

Answer:

CPU Central Processing Unit

5 0
3 years ago
Read 2 more answers
Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?.
Salsk061 [2.6K]

That is calld a bruteforce attack

4 0
2 years ago
Which of these is an advantage of using the Clipboard task pane? A. You are able to apply OLE easily. B. There are more paste op
NemiM [27]
Hi!

The Clipboard in Microsoft Word is great for having more than just one paste option via the paste command. 

Using the Clipboard, you can hold up to 24 items that are copied. This makes it efficient if you have a lot of data you would like to paste.

Hopefully, this helps! =)
4 0
4 years ago
Read 2 more answers
Other questions:
  • 3. Which of these paste options is commonly available from the Paste Options button? A. Paste as content only B. Use the destina
    9·1 answer
  • At an open or uncontrolled intersection, yield if ____.
    15·2 answers
  • An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and
    13·1 answer
  • WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!
    8·1 answer
  • Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
    12·1 answer
  • Which data type is 2.5?
    5·1 answer
  • Which one of these do you need to become president of the US ?
    6·2 answers
  • Match the image to the view type in a presentation program. scroll bar tool bar status bar menu bar provides an array of buttons
    10·2 answers
  • Which of the following correctly orders the units of measure from least to greatest?
    7·2 answers
  • Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an examp
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!