Pharming attacks, which are used to fool users into submitting sensitive information to malicious servers, typically involve which attack method?
A.
ARP poisoning
B.
DNS cache poisoning
C.
DHCP exhaustion
D.
DHCP server spoofing
E.
IP spoofing
Pharming attacks, which are used to fool users into submitting sensitive information to malicious servers, typically involve which attack method?
Pharming attacks, which are used to fool users into submitting sensitive information to malicious servers, typically involve which attack method?
A.
ARP poisoning
B.
DNS cache poisoning
C.
DHCP exhaustion
D.
DHCP server spoofing
E.
IP spoofing