The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.
<h3>What is DNS poisoning?</h3>
In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.
Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.
Learn more about hacker from
brainly.com/question/24956493
Answer:the first IP when the traceroute is started is our IP. It is our private IP which is displayed because it is the first hop for the tracing of the route. Hence, our IP is shown in the first statement.
Explanation:
The way a particular application views the data from the database that the application uses is a sub-schema.
<h3>What is Database?</h3>
A Database may be defined as a process of collecting data and information that is principally assembled for quick search and recoupment by a computer.
The sub-schema is the reasoning elucidation of that section of the database which is applicable and accessible to a specific application. This type of database is common to two or more applications.
Therefore, the sub-schema is the way through which a particular application views the data from the database that the application uses.
To learn more about Database, refer to the link:
brainly.com/question/26096799
#SPJ4
Answer
???
Explanation:
Was this a school question?