Which of the following attack Jason can infer from his findings?

Jason, a renowned forensic investigator, is investigating a network attack that resulted in the
compromise of several systems in a reputed multinational’s network. He started Wireshark to capture
the network traffic. Upon investigation, he found that the DNS packets travelling across the network
belonged to a non-company configured IP. Which of the following attack Jason can infer from his
findings?

Jason, a renowned forensic investigator, is investigating a network attack that resulted in the
compromise of several systems in a reputed multinational’s network. He started Wireshark to capture
the network traffic. Upon investigation, he found that the DNS packets travelling across the network
belonged to a non-company configured IP. Which of the following attack Jason can infer from his
findings?

A.
DNS Redirection

B.
Session poisoning

C.
Cookie Poisoning Attack

D.
DNS Poisoning



Leave a Reply 0

Your email address will not be published. Required fields are marked *