Which of the following attack Jason can infer from his findings?

Jason, a renowned forensic investigator, is investigating a network attack that resulted in the
compromise of several systems in a reputed multinational’s network. He started Wireshark to
capture the network traffic. Upon investigation, he found that the DNS packets travelling across
the network belonged to a non-company configured IP. Which of the following attack Jason can
infer from his findings?

Jason, a renowned forensic investigator, is investigating a network attack that resulted in the
compromise of several systems in a reputed multinational’s network. He started Wireshark to
capture the network traffic. Upon investigation, he found that the DNS packets travelling across
the network belonged to a non-company configured IP. Which of the following attack Jason can
infer from his findings?

A.
DNS Poisoning

B.
Cookie Poisoning Attack

C.
DNS Redirection

D.
Session poisoning



Leave a Reply 0

Your email address will not be published. Required fields are marked *