It is a type of cyber attack in which the Domain Name System server data is modified.
This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker.
DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer.
So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation.
The DNS server responds to this request by providing the IP address where the computer can locate that domain name.
So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request.
If an incorrect translation has been entered into the DNS cache, it is said to be poisoned.
Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website.
As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.
As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.
A numeric value that is approximate consists of a mantissa and an exponent. The mantissa is a signed numeric value, so also is the exponent a signed integer that specifies the magnitude of the mantissa.
The correct answer of the given question above would be second option: SOURCE DATA ENTRY. <span>Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; the non keyboard method is called the source data entry.</span>
The answer is true. Data redundancies should be avoided,
because redundancy of information or encoded data, may cause inconsistencies
within the database itself and the system and also redundant information can
consume a lot of storage space and will just waste it, which is why it is
important to avoid data redundancy.