1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
5

Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or

zone file?
Computers and Technology
1 answer:
wariber [46]3 years ago
4 0

Answer:

DNS poisoning or DNS cache poisoning                                              

Explanation:

  • It is also called spoofing.
  • It is a type of cyber attack in which the Domain Name System server data is modified.
  • This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker.
  • DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer.
  • So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation.
  • The DNS server responds to this request by providing the IP address where the computer can locate that domain name.
  • So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request.
  • If an incorrect translation has been entered into the DNS cache, it is said to be poisoned.
  • Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website.
  • As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.
  • As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.
You might be interested in
A case competitions database:You work for a firm that has decided to sponsor case competitions between teams of college business
Strike441 [17]

Answer:

We will ned (4) four tables.

Explanation:

For the given scenario we will have to build a relational database. The database will have four tables i.e. Competation, Collage, Team and student.

For each table the database fields are mention below. Note that foreign keys are mentioned in itallic.

Competition:

Competition_ID, Competition_Name, Competition_Data, Competition_Name _of_Branch, <em>College_ID</em>

<em />

Collage:

Collage_ID, Collage_Name, Collage_Contact, Collage_address

Team:

Name, Color, <em>Team_ID, College_ID, Competition_ID</em>

<em />

College:

Student_ID, First_Name, Last_Name, Date_of_Birth, Major, Expected_Gradiuation_Date, <em>Collage_ID, Team_ID, Competation_ID</em>

3 0
3 years ago
PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?
Ad libitum [116K]

Answer:

a) all cabling hope it helps

3 0
2 years ago
Write a program that asks the user to input their first and last names. The first prompt should state:
VikaD [51]

first = input("Please input your first name: ")

last = input("Please input your last name: ")

print(last+", "+first)

I hope this helps!

8 0
2 years ago
Which 3 navigation features are missing in a reports only user view?
san4es73 [151]

Explanation:

when a user changes his or her view to a Report only view when using QuickBooks online they only see a report list page, without having such features as; Navigation panel, Search box or Quick Create (+) icon.

7 0
3 years ago
Read 2 more answers
Which aspect of design theory describes the relationship of one object to another in size? A.value B.form C.proportion D.tecture
pashok25 [27]

Answer:

<u>Proportion </u>is the aspect in design theory that describe the relationship of one object to another object in size.

Explanation:

Proportion is an important aspect in design theory in terms of size. It refers to the relationship between object of the design in terms of size. The relation between size of different object in design theory can describe as, if the size of one object increases or decreases, it may leads to change in size of other object. It is called proportion.

If the size of one object increase with the size of other object, the relation is called direct proportion. If the size of one object decrease with the increase in size of other object is called inverse proportion.

7 0
3 years ago
Other questions:
  • Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a
    8·1 answer
  • A ____ client locates all or most of the processing logic on the server.
    11·1 answer
  • 1. Write an expression whose value is the result of converting the str value associated with s to an int value. So if s were ass
    12·1 answer
  • What expressions will initialize d with a random value such that all possible values for d are given by the inequality 1.5 ≤ d &
    8·1 answer
  • private members of a class are accessible only from _____________ of the same class or from their friends
    12·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • Help me!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!​
    9·1 answer
  • What is one way to process your thoughts about the information you are reading?
    15·1 answer
  • Computer simulations were first developed during __________<br> as a part of the _____________
    5·1 answer
  • Create a SELECT statement that returns the count, average, max and min of the invoices submitted by each vendor, who has submitt
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!