1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
5

Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or

zone file?
Computers and Technology
1 answer:
wariber [46]3 years ago
4 0

Answer:

DNS poisoning or DNS cache poisoning                                              

Explanation:

  • It is also called spoofing.
  • It is a type of cyber attack in which the Domain Name System server data is modified.
  • This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker.
  • DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer.
  • So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation.
  • The DNS server responds to this request by providing the IP address where the computer can locate that domain name.
  • So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request.
  • If an incorrect translation has been entered into the DNS cache, it is said to be poisoned.
  • Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website.
  • As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.
  • As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.
You might be interested in
" Which technique for representing numeric data uses the mantissa to hold the significant digits of a value?"
UkoKoshka [18]

Answer:

signed magnitude

Explanation:

A numeric value that is approximate consists of a mantissa and an exponent. The mantissa is a signed numeric value, so also is the exponent a signed integer that specifies the magnitude of the mantissa.

4 0
4 years ago
Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
Sergio [31]
The correct answer of the given question above would be second option: SOURCE DATA ENTRY. <span>Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; the non keyboard method is called the source data entry.</span>
4 0
4 years ago
calculate how much memory is needed to store a foir minute music trackusing the of bytes needed per second from above​
sergeinik [125]

Answer:

1400 bytes

hope that helps!

4 0
3 years ago
In this problem you are to compare reading a file using a single-threaded file server and a multithreaded server. It takes 12 ms
borishaifa [10]

The answer & explanation for this question is given in the attachment below.

3 0
3 years ago
Data redundancy should be avoided because it wastes storage space and might cause inconsistencies within the database. _________
Ivanshal [37]

The answer is true. Data redundancies should be avoided, because redundancy of information or encoded data, may cause inconsistencies within the database itself and the system and also redundant information can consume a lot of storage space and will just waste it, which is why it is important to avoid data redundancy.

5 0
3 years ago
Other questions:
  • Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" an
    13·2 answers
  • To illustrate a point in a Word document with a simple chart, what command should you select
    6·2 answers
  • Ucf the ability to connect data in different tables in a database through a common field is sometimes referred to as a ____.
    9·1 answer
  • How is it possible to find encyclopedias and reference texts on the internet
    11·2 answers
  • __________ is the process by which previously distinct technologies come to share tasks and resources.
    10·1 answer
  • What is the result when you run the following program?<br> print("2 + 7')<br> print(3 + 1)
    6·2 answers
  • Your mom calls you. She is creating a book of poetry. Many of these poems only take up the first half of a document . She asks i
    10·2 answers
  • PLEASE HELP!!! WILLGIVE BRAINLIEST!!!
    11·2 answers
  • If you delete a conversation many times with someone like this, will you stop receiving messages from them?
    13·1 answer
  • 1. What is the difference between a group and a topic?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!