1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
5

Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or

zone file?
Computers and Technology
1 answer:
wariber [46]3 years ago
4 0

Answer:

DNS poisoning or DNS cache poisoning                                              

Explanation:

  • It is also called spoofing.
  • It is a type of cyber attack in which the Domain Name System server data is modified.
  • This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker.
  • DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer.
  • So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation.
  • The DNS server responds to this request by providing the IP address where the computer can locate that domain name.
  • So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request.
  • If an incorrect translation has been entered into the DNS cache, it is said to be poisoned.
  • Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website.
  • As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.
  • As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.
You might be interested in
An excel worksheet can have a maximum of ____ columns in a worksheet.
Marina CMI [18]

It can have only 16,384 number of columns

6 0
3 years ago
When is a wired connection preferred to a wireless connection by an end-user device?
harkovskaia [24]

Answer:

Option (b) When the end-user device will run an application that requires a dedicated connection to the network

Explanation:

  • Option (b) is the correct option.
  • When the user device requires a highly dedicated network environment to itself to run a web application that requires large download and upload speeds, bandwidth requirements then it prefers a wired connection than a wireless connection.
  • If the wireless signal is within the reach, then it advisable to go for a wireless connection than a wired connection. A wired connection requires other hardware equipments like a internet connection cable etc. which is not required in case of wireless connection. So, option (a) is wrong option.
  • WLAN NIC is a wireless interface network controller that connects to a wireless radio based network than a wired network.So, option (c) is wrong option.
  • Delay torrent network is designed to operate where continuous network connectivity is not available like extreme terrestrial spaces, space communications, inter planetary communications etc.So, option (d) is wrong option.
6 0
3 years ago
Which statements accurately describe tropical rain forests
sattari [20]

The tropical rain forest is a forest of tall trees in a region of year-round warmth. An average of 50 to 260 inches of rain falls yearly. Rain forests belong to the tropical wet climate group.

Explanation:

  • The temperature in a rain forest rarely gets higher than 93 °F or drops below 68 °F. The average humidity is between 77 and 88%, rainfall is often more than 100 inches a year. In monsoonal areas, there is a real dry season.
  • Rainforests now cover less than 6% of Earth's land surface. Tropical rainforests produce 40% of Earth's oxygen.
  • About 1/4 of all the medicines we use come from rainforest plants. Curare comes from a tropical vine, is used as an anesthetic and to relax muscles during surgery. Quinineis used to treat malaria.
  • There are four very distinct layers of trees in a tropical rain forest. They are the emergent, upper canopy, understory, and forest floor.
  • The soil of the tropical rainforests is shallow, poor in nutrients and without soluble minerals. Years of rainfall have washed away the nutrients in the soil obtained from weathered rocks.
  • The tropical rain forest can be found in three major geographical areas around the world.
  • Central America in the the Amazon river basin.  Africa - Zaire basin, with a small area in West Africa. Indo-Malaysia - west coast of India, Assam, Southeast Asia, New Guinea and Queensland, Australia.
7 0
3 years ago
What is the appropriate formula used to determine the area of a surface
Sholpan [36]

Answer:

om2

Explanation:

5 0
4 years ago
Read 2 more answers
Active Directory and __________ are critical in centralizing control of authentication and security policies in a domain environ
vagabundo [1.1K]

Answer:

DNS(Domain Name Services) is the correct answer.

Explanation:

DNS is the type of directory system which is distributed that finds the solution of a hostname which is readable by the human being. It is also critical in centralizing control of the confirmation and policies of the security in the environment of the domain with Active Directory. That's why the following answer is correct.

4 0
3 years ago
Other questions:
  • Jack wants to store a large amount of data on his computer. He chooses to use a database for this purpose. What is a database? A
    8·1 answer
  • A technician is tasked to implement a wireless router that will have the fastest data transfer speed at 5 GHz frequency. Which o
    11·1 answer
  • Write a C program that reads a string containing text and nonnegative numbers from the user and prints out the numbers contained
    6·1 answer
  • A(n) ____ is a request for specific data from a database.
    9·1 answer
  • List two items that are required to make a text file into a bash script.
    15·1 answer
  • Which one of these is correct PI of a XML document?
    13·1 answer
  • What technique is used when setup times at a workstation are sequence dependent?
    15·1 answer
  • 32.
    9·1 answer
  • What is 2D thinking and 3D thinking? i literally don't understand
    6·1 answer
  • In traditional programming, probably the most often used error-handling outcome was to ____.Group of answer choicesterminate the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!