1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
6

hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map

s host names and IP addresses
Computers and Technology
1 answer:
shusha [124]3 years ago
7 0

Answer:

DNS poisoning

Explanation:

This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.

You might be interested in
__________ is a website that offers a variety of Internet services from a single, convenient location.
VLD [36.1K]

Answer:

Portal is the correct answer.

Explanation:

A portal is a website that is a web portal which is not just like the website because the web portal provides different things from an individual access point. It also offers its customers or users a variety of services from an individual and convenient location. That's why the following answer is correct.

5 0
3 years ago
Which selection below lists two operating systems that include BitLocker? A. Windows XP Professional and Windows 7 Professional
Leona [35]
It will be the windows 8 professional
3 0
3 years ago
The rules and guidelines for appropriate computer mediated communication are called?
irinina [24]
<span>The rules and guidelines for appropriate computer mediated communication are called netiquette. 
It is a blend of two words: net (from Internet) and etiquette, or the appropriate behavior. 
</span>
4 0
4 years ago
Add my epic games account "Lil Carr OXB" and if that not work, then "swish4444"
Andrew [12]

Answer:

-_________________________________-

Explanation:

-__________________________________________________________-

3 0
3 years ago
Read 2 more answers
Is the weegy face real?or is it computer generated?
allsm [11]
Weegy face is known to be a computer generated program that was designed well by expert developers. It's a type of image that usually works whenever you use the Internet Explorer, and works most of the time on that browser.
3 0
3 years ago
Other questions:
  • Why are specification for food processing tool,equipmentand untensils necessary?​
    8·1 answer
  • Mike recently started using Google Display Ads to create a more automated approach to managing his campaigns. What's one automat
    10·1 answer
  • Which of these is a major mobile game developer?
    9·1 answer
  • Which of these is a Microsoft certification for system engineers?
    9·1 answer
  • Fill in the blanks Pasaline could ----- and ------- very easily.​
    8·1 answer
  • What does running the “sudo” command do?
    6·1 answer
  • Mark is flying to Atlanta. The flight is completely full with 200 passengers. Mark notices he dropped his ticket while grabbing
    15·1 answer
  • What does an arrow after a command indicate
    13·2 answers
  • Which of the following is an antivirus software?
    6·1 answer
  • Should a UDP packet header contain both Sour Port # and Destination Port #?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!