1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
5

Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or

zone file?
Computers and Technology
1 answer:
wariber [46]3 years ago
4 0

Answer:

DNS poisoning or DNS cache poisoning                                              

Explanation:

  • It is also called spoofing.
  • It is a type of cyber attack in which the Domain Name System server data is modified.
  • This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker.
  • DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer.
  • So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation.
  • The DNS server responds to this request by providing the IP address where the computer can locate that domain name.
  • So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request.
  • If an incorrect translation has been entered into the DNS cache, it is said to be poisoned.
  • Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website.
  • As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.
  • As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.
You might be interested in
4.11 lesson practice edhesive
spin [16.1K]

Answer:

the last one

Explanation:

6 0
2 years ago
Read 2 more answers
Follow me on Tik-Tok​
ivanzaharov [21]

Answer:

Sure

Explanation:

5 0
3 years ago
Read 2 more answers
Technician A says that automotive engine blocks are usually classified by the number of cylinders the block. Technician B says t
viva [34]
<span>A. Both Technicians A and B is the answer</span>
8 0
3 years ago
50 POINTS! What can be viewed in the Tasks folder? Check all that apply.
Rom4ik [11]

1, 2, and 4 :))) good luck

6 0
3 years ago
Read 2 more answers
What is an example of a source that is less likely to be copyrighted?
Ivahew [28]
An example would be a: motorized vehicle aka a car or a bike etc.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Is Digital technology always better or should we champion or even return to innovative of analog machines and experiences? Apex
    13·1 answer
  • The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems t
    9·1 answer
  • Which of the following is not part of active listening?
    6·2 answers
  • In real-world environments, risks and their direct consequences will most likely span across several domains. However, in the la
    12·1 answer
  • . Write a swift programming code to perform following tasks a) Declare a variable that stores the age of a person b) Declare a c
    5·1 answer
  • For some reason, Danica's classmate George could not find the registered symbol in the symbol gallery. He is selling
    14·1 answer
  • What are the physical aspect of a presentation​
    7·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • Full form of NCP?............
    5·2 answers
  • Zoe wants to post something controversial online, but then she remembers that employers may look at her social media when she st
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!