In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt the servers' answers to routine dns queries from other systems on that network. a. denial-of-service (dos) b. port mirroring c. dns cache poisoning d. evasion

Respuesta :

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.