Exam4Training

Which of the following BEST describes the attack that is being detected?

A user attempts to load a web-based application, but the expected login screen does not appear A help desk analyst troubleshoots the issue by running the following command and reviewing the output on the user’s PC

The help desk analyst then runs the same command on the local PC

Which of the following BEST describes the attack that is being detected?
A . Domain hijacking
B DNS poisoning
C MAC flooding
B. Evil twin

Answer: B

Explanation:

DNS poisoning, also known as DNS spoofing or DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System (DNS) data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect result record, such as an IP address. This results in traffic being diverted to the attacker’s computer (or any other malicious destination).

DNS poisoning can be performed by various methods, such as:

✑ Intercepting and forging DNS responses from legitimate servers

✑ Compromising DNS servers and altering their records

✑ Exploiting vulnerabilities in DNS protocols or implementations

✑ Sending malicious emails or links that trigger DNS queries with poisoned responses

According to CompTIA Security+ SY0-601 Exam Objectives 1.4 Given a scenario, analyze potential indicators to determine the type of attack:

“DNS poisoning, also known as DNS spoofing or DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System (DNS) data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect result record.”

References:

https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.cloudflare.com/learning/dns/dns-cache-poisoning/

Exit mobile version