1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
5

Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or

zone file?
Computers and Technology
1 answer:
wariber [46]3 years ago
4 0

Answer:

DNS poisoning or DNS cache poisoning                                              

Explanation:

  • It is also called spoofing.
  • It is a type of cyber attack in which the Domain Name System server data is modified.
  • This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker.
  • DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer.
  • So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation.
  • The DNS server responds to this request by providing the IP address where the computer can locate that domain name.
  • So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request.
  • If an incorrect translation has been entered into the DNS cache, it is said to be poisoned.
  • Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website.
  • As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.
  • As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.
You might be interested in
Write a loop that continually asks the user what food the user has in their refrigerator until the user enters apples, in which
almond37 [142]

(Disclaimer: I am not a professional, so it might not be the most concise answer possible, but I did run the Python script and it works)

Answer:

user_input = input("What food do you have in your refrigerator? ").lower()

count = 0

while True:

   if user_input != 'apples':

       count += 1

       print(f'You have a {user_input} with a total of {count} food(s)\n')

       user_input = input("What food do you have in your refrigerator? ")

   else:

       break

7 0
3 years ago
I need someone to help me like rnnnnn please
nevsk [136]

.send me 1000 ruppes i will answer each and every question you send send 1000 ruppes to this number 93257 50999

6 0
3 years ago
You are the senior nurse on the unit and you are orienting a new graduate LVN/LPN. One of the subjects you want to cover today i
Margarita [4]

Answer: D. Homans sign

Explanation:

Check for the severity of the swelling, monitor the flow of blood to the tissue, pulses equality, check for homans sign such as pain in the leg around the calve, the calve is meant to be of equal size and warmth. There should not be any reddish colouration or pains around the calve when there is ankle movement as this shows a negative sign of homans.

3 0
3 years ago
Gustavo is completing his homework online. When he uses a computer, what converts the information he inputs into instructions th
Otrada [13]
I can not understand your question, about it. What is homework of Gustavo working in, Visual or Dev C++ with any language?
4 0
3 years ago
Read 2 more answers
What is the output of the following code? Select all that apply c=0 while ( c < 11 ) c = c + 6
Andreyy89

Answer:

crop=6

Explanation:

6 0
1 year ago
Other questions:
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • It is a function that ends the connection to the database.
    9·2 answers
  • The default _____ color is set when you type text.
    6·1 answer
  • The part of the poppet valve that contacts the valve seat is called the?
    10·2 answers
  • The ____ command displays the last 10 lines of a text file.
    5·1 answer
  • Which shortcut key combination will move the cursor to the beginning of the line?
    13·1 answer
  • Help me to write spaghetti stack function, please!!
    11·1 answer
  • Short note about micro miniaturzation​
    6·2 answers
  • I need help on this, need answer asap.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!