adplus-dvertising
frame-decoration

Question

______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.

a.

DNS poisoning

b.

DNS re-routing

c.

DNS cracking

d.

Domain link poisoning

Answer: (a).DNS poisoning

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.

Similar Questions

Discover Related MCQs

Q. DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.

Q. A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it.

Q. The ____________ Domain Name Server data will get spread to the ISPs & will be cached there.

Q. The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship.

Q. Which of the following data is not appropriate here, if you delete cache, cookies, and browser history?

Q. ____________ are tiny files which get downloaded to your system when you visit a website.

Q. Browser ___________ are impermanent internet files which helps the browsers download web images, data & documents for rapid performance & viewing in the future.

Q. ___________ is just a group of data downloaded for helping in displaying a web page faster.

Q. Attackers could steal ___________ to achieve illegitimate accessing to online accounts & disturbs the personal information.

Q. Which of the following is not an example of browsing data?

Q. There are cookies that are designed to track your browsing habits & aim ads to you.

Q. Keeping browsing habits & aiming specific ads to you is harmless but it might reduce your online privacy.

Q. There are ____________ that are designed to track your browsing habits & aim ads that are relevant to the user.

Q. Which of the following is the most viral section of the internet?

Q. ____________ type of sites are known as friend-of-a-friend site.

Q. Which of the following is not an appropriate measure for securing social networking accounts?

Q. Which of them is a proper measure of securing social networking account?

Q. If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.

Q. ________________ is a popular tool to block social-media websites to track your browsing activities.

Q. Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully.