Which of the following is this attack called?

Joe, a system administrator, receives reports that users attempting to reach the corporate website are arriving
at an unfamiliar website instead. An investigation by a forensic analyst found that the name server log has
several corporate IP addresses that were changed using Joe’s credentials.
Which of the following is this attack called?

Joe, a system administrator, receives reports that users attempting to reach the corporate website are arriving
at an unfamiliar website instead. An investigation by a forensic analyst found that the name server log has
several corporate IP addresses that were changed using Joe’s credentials.
Which of the following is this attack called?

A.
Xmas attack

B.
DNS poisoning

C.
Web server attack

D.
Spoofing attack



Leave a Reply 0

Your email address will not be published. Required fields are marked *