Answer:
(B) It allows an attacker to redirect targets to malicious webserver.
(D) It affects any clients querying the poisoned DNS server.
Explanation:
DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.
Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.
The computer browser then get to the intended website through the IP address.
Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.
Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.
Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.
Answer:
Examples of Fact-finding techniques includes:
-
Prototyping
-
Questionnaires
- Research and sites visit
-
Interviews
Explanation:
It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.
<u>Prototyping
</u>
<em>Advantage:</em> enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.
<em>Disadvantage:</em> Training and Development cost consumes resources.
<u>Research and site visit </u>
<em>Advantage :</em> better time management if the problem has been researched upon before.
<em>Disadvantage:</em> appropriate permission is often needed before using research materials.
<u> Questionnaires
</u>
<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.
<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.
<u>Interviews</u>
<em>Advantage:</em> The body language of interviewees is been perceived.
<em>
Disadvantage: </em>Interviewing is time consuming and costly.
Solution :
function tickets(user_tickets){
var num_tickets;
if (user_tickets < 5) {
num_tickets = 1;
return ('num_tickets: '+ num_tickets);
}
else {
num_tickets = user_tickets;
return('num_tickets: '+ num_tickets);
}
}
// Testing the tickets function
// With user_tickets = 3, 5, 8, and 1
console.log(tickets(3));
console.log(tickets(5));
console.log(tickets(8));
console.log(tickets(1));
I don’t think we should because we all have our one choices that we should achieved and we should show
Answer:
A. simple to construct and easy to repair
Explanation:
A dynamic microphone works on the principle of electromagnetic principle. A diaphragm is attached to a coil of wire which helps in producing sound. Responding to the sound waves, the coil of the wire is vibrated by the diaphragm. A magnetic field is created by the magnet which is present inside the coil of wire. The electrical signal is generated in response to the motion of the coil. The speed of the motion produces the amount of the current.
Since the construction of a dynamic microphone is easier as compared to any other microphone, John is likely to opt to build one.