1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
4 years ago
6

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP

server because of the importance of their job. The attacker gain access to the DNS server and redirect the direction www.google.com to his own IP address. Now when the employees of the office wants to go to Google they are being redirected to the attacker machine. What is the name of this kind of attack?
a. DNS spoofingb. ARP Poisoningc. Smurf Attackd. MAC Flooding
Computers and Technology
1 answer:
yaroslaw [1]4 years ago
5 0

Answer:

The correct option to the following question is option (A) DNS spoofing.

Explanation:

(Domain Name System)DNS spoofing is also known as the Domain Name System Poisoning.

DNS spoofing referred to as the DNS server is the record of 'spoofed' or redirect the traffic. This redirections of the traffic assents the hackers to steal data, spread malware, etc.

<u>DNS works out by using various functions are</u>:

  • 'Compromising the DNS server'
  • 'DNS cache poisoning'
  • 'Implementing the Metropolitan Area Network in Middle Attack'.
You might be interested in
Is this statement true or false?
____ [38]
This answer could be either, but personally false. Humor drives attention into your work (if the humor isn’t about it then yes it would drive it far off) but it makes people focus and listen to your presentation so they would answer your jokes. Hope this helped!
7 0
3 years ago
Which of the following is not a use of a hash function
soldi70 [24.7K]

Answer:

the answer would be there

Explanation:

7 0
3 years ago
Joining two or more objects in a publication is known as _____.
icang [17]
The answer is grouping
7 0
3 years ago
Write. true or false​
ella [17]
Um I need a image or smth
8 0
3 years ago
Read 2 more answers
List and describe two of the four generally recognized security positions.
Llana [10]
CISO: This person reports directly to the CIO and is responsible for assessing, managing, and implementing security.
Security Technician: Entry-level position and provides technical support to conFgure security hardware, implement security software, and diagnose and troubleshoot <span>problems</span>
8 0
4 years ago
Other questions:
  • Speaker,printers, and monitors are all considered what?
    10·2 answers
  • When computers are connected and operate through one main computer, it is called a _________ network
    14·2 answers
  • How many words fit on a double-spaced page?
    11·1 answer
  • Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test,
    14·1 answer
  • What do secondary sources rely on for their analysis of events?
    6·2 answers
  • Function of C:\&gt;DIR*.doc/p​
    5·1 answer
  • What is essence of computer systems and networks?​
    9·1 answer
  • I live in Pennsylvania which observes eastern standard time.
    13·1 answer
  • Using complete sentences post a detailed response to the following.
    15·1 answer
  • 1.The ___________ method adds a new element onto the end of the array.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!