1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
5

Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or

zone file?
Computers and Technology
1 answer:
wariber [46]3 years ago
4 0

Answer:

DNS poisoning or DNS cache poisoning                                              

Explanation:

  • It is also called spoofing.
  • It is a type of cyber attack in which the Domain Name System server data is modified.
  • This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker.
  • DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer.
  • So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation.
  • The DNS server responds to this request by providing the IP address where the computer can locate that domain name.
  • So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request.
  • If an incorrect translation has been entered into the DNS cache, it is said to be poisoned.
  • Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website.
  • As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.
  • As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.
You might be interested in
Write a query to display the department name, location name, number of employees, and the average salary for all employees in th
Zigmanuir [339]

Answer:

is hjs yen ; he jawjwjwjwjw

6 0
2 years ago
What are the 3 biggest advancements in computers?
Georgia [21]

Answer:

abacus . Mesopotamia or China, possibly several thousand years BCE. ...

binary math . Pingala, India, 3rd century BCE. ...

punched card . Basile Bouchon, France, 1725. ...

Explanation:

:)

6 0
2 years ago
If you're unsure of what chart to use for a set of data, what feature does Excel include that will help you to decide? A. Sparkl
asambeis [7]
If what I found is correct it would be C, all charts... If not that then it would be B.
6 0
3 years ago
Read 2 more answers
What is Deep learning
vodomira [7]

Answer:

Deep learning is an AI function that mimics the workings of the human brain in processing data for use in detecting objects, recognizing speech, translating languages, and making decisions. Deep learning AI is able to learn without human supervision, drawing from data that is both unstructured and unlabeled.

3 0
3 years ago
What are the implications for a company that relies solely on technology to store all of their data ?
romanna [79]

A store that relies solely on technology to store all of their data would be a store that either sells technology or an online store like Amazon

3 0
2 years ago
Other questions:
  • Which of the following is not an impact device?<br> Joy Stick<br> Track Ball<br> Mouse<br> Printer
    10·1 answer
  • Which of the following best describes Roblox?
    12·2 answers
  • 1. Why do you think coding languages generally include the ability to create comments? What would those comments be used for? In
    10·1 answer
  • Why is a monitor an output device?
    15·1 answer
  • When did the mantle of the earth form
    14·2 answers
  • A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
    10·1 answer
  • This is a python program.
    6·1 answer
  • Some of the latest smartphones claim that a user can work with two apps simultaneously. This would be an example of a unit that
    5·1 answer
  • Which of the following scenarios falls into the category of network crimes?
    8·2 answers
  • owever, sitting in a corner of the store, a hacker had just set up an open "rogue" wireless hotspot posing as the coffee shop’s
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!