adplus-dvertising
frame-decoration

Question

A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it.

a.

Server data

b.

Domain name

c.

DNS cache

d.

System file

Answer: (c).DNS cache

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it.

Similar Questions

Discover Related MCQs

Q. The ____________ Domain Name Server data will get spread to the ISPs & will be cached there.

Q. The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship.

Q. Which of the following data is not appropriate here, if you delete cache, cookies, and browser history?

Q. ____________ are tiny files which get downloaded to your system when you visit a website.

Q. Browser ___________ are impermanent internet files which helps the browsers download web images, data & documents for rapid performance & viewing in the future.

Q. ___________ is just a group of data downloaded for helping in displaying a web page faster.

Q. Attackers could steal ___________ to achieve illegitimate accessing to online accounts & disturbs the personal information.

Q. Which of the following is not an example of browsing data?

Q. There are cookies that are designed to track your browsing habits & aim ads to you.

Q. Keeping browsing habits & aiming specific ads to you is harmless but it might reduce your online privacy.

Q. There are ____________ that are designed to track your browsing habits & aim ads that are relevant to the user.

Q. Which of the following is the most viral section of the internet?

Q. ____________ type of sites are known as friend-of-a-friend site.

Q. Which of the following is not an appropriate measure for securing social networking accounts?

Q. Which of them is a proper measure of securing social networking account?

Q. If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.

Q. ________________ is a popular tool to block social-media websites to track your browsing activities.

Q. Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully.

Q. Keeping the password by the name of your pet is a good choice.

Q. Increase your security for social media account by always ____________ as you step away from the system.