Joe, a system administrator, receives reports that users attempting to reach the corporate website are arriving
at an unfamiliar website instead. An investigation by a forensic analyst found that the name server log has
several corporate IP addresses that were changed using Joe’s credentials.
Which of the following is this attack called?
A.
Xmas attack
B.
DNS poisoning
C.
Web server attack
D.
Spoofing attack