In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
the servers' answers to routine dns queries from other systems on that network. a. denial-of-service (dos) b. port mirroring c. dns cache poisoning d. evasion
A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology.