1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
5

Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or

zone file?
Computers and Technology
1 answer:
wariber [46]3 years ago
4 0

Answer:

DNS poisoning or DNS cache poisoning                                              

Explanation:

  • It is also called spoofing.
  • It is a type of cyber attack in which the Domain Name System server data is modified.
  • This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker.
  • DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer.
  • So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation.
  • The DNS server responds to this request by providing the IP address where the computer can locate that domain name.
  • So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request.
  • If an incorrect translation has been entered into the DNS cache, it is said to be poisoned.
  • Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website.
  • As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.
  • As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.
You might be interested in
You work as the IT security administrator for a small corporate network. You have designed the physical security of the offices
ladessa [460]

The security IT administrator he or she is planning to install smart card communications over the network which is can be access through TCP IP address.

Smart card key reader to be placed or installed where is required  such as an opening door  or entrance of office or organization extra.

Key card readers should be contactless and record more volume of data and it should synchized with the system at regular intervals.

By Installing smart card and it readers unauthorized  person entry to lab or network server can be avoided. Since smart card reader connected to the network, IT SECURITY administrator can generate log reports.

5 0
3 years ago
What query class will you choose<br> for this query "women are evil"?
nikklg [1K]

Answer:

A) Gibberish or Vague Profane

Explanation:

Hope this helps

7 0
2 years ago
What is the function of print format
Ivahew [28]
Print formatted refers to a control parameter used by a class of functions in the string-processing libraries of various programming languages.
6 0
3 years ago
Read 2 more answers
The steps for moving data from one cell to another are _____.
swat32
The steps for moving data from one cell to another are : 
Select the cell by pointing on the cell clicking it, and dragging it to the new cell. <span>To move a cell or range of cells, point to the border of the selection. When the pointer becomes a move pointer , drag the cell or range of cells to another location.</span>
3 0
3 years ago
Choose the correct option that completes the sentence.
vekshin1

What are the answer options?

5 0
3 years ago
Other questions:
  • Smartphones can have virtual keyboards or physical keyboards. What are 3 advantages and disadvantages to each one?
    13·1 answer
  • Write a statement that declares a prototype for a function add, which has two int parameters and returns an int .
    13·1 answer
  • Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
    10·1 answer
  • What is a phonograph?
    15·2 answers
  • What are two tasks that need to be done to a hard drive before operations can use it
    11·1 answer
  • Please help i will give brainiest. Plus 30 points
    9·1 answer
  • Which of these conclusions supports the fact that Eclipse is categorized as an IDE?
    8·1 answer
  • Computer hardware refers to: Group of answer choices the mechanism through which users interact with a computer. handheld comput
    13·1 answer
  • What’s unique about New Cashierless stores?
    14·1 answer
  • Since data-flow diagrams concentrate on the movement of data between processes, these diagrams are often referred to as: A. flow
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!