Answer:
(B) It allows an attacker to redirect targets to malicious webserver.
(D) It affects any clients querying the poisoned DNS server.
Explanation:
DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.
Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.
The computer browser then get to the intended website through the IP address.
Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.
Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.
Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.
Where ARE the books that you borrowed?
Answer and Explanation:
Reliability is important because if the service lacks lacks reliability this could mean losing a packet or acknowledgement which then requires retransmission.
Delay can be tolerable in different degrees by applications, for example online chatting or conferences need to have the minimum delay possible.
Jitter is the variation in delay for packets belonging to the same flow.
High Jitter: difference between delays is large
Low jitter: difference between delays is small.
Bandwidth depends on the application. In video conferences, for example, there is a need to send million of bits per second to refresh a colour screen while sending a email may not reach even a million.
Answer:me myself would go with the Iphone XR
Explanation:
Because its like a combined phone of those two phones together and its not as exspnsive as the other phones and overall its good cause i have had it since it came out and had no problems with it.
Different video files and operating system versions can cause compatibility issues to arise between computer systems.
Since, file formats and operating systems may not be compatible with each other. For example, earlier versions of Windows may not be able to play certain types of video files due to the codecs used to encode them.
<h3>Importance of compatibility between operating system computer systems</h3>
Compatibility between operating systems is important because it allows different computer systems to interact and share resources. This includes sharing of programs, files, and data.
Compatibility also allows users to access applications and services on different platforms. It also enables efficient use of hardware and software resources, as well as efficient use of resources in a network. Compatibility also ensures that computer systems can communicate with each other and can access the same resources. Without compatibility, it would be difficult for computer systems to interact with each other.
What are two compatibility issues that may arise between computer systems while transferring presentations? (Fill in the blank).
Different video files and _____ can cause compatibility issues to arise between computer systems.
Learn more about Compatibility between operating systems:
brainly.com/question/24760752
#SPJ4