|Que.______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.
|a. DNS poisoning
|b. DNS re-routing
|c. DNS cracking
|d. Domain link poisoning
|Que.DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.
|a. ISP server
|b. DNS server
|c. Linux server
|d. Domain user
|Que.A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it.
|a. Server data
|b. Domain name
|c. DNS cache
|d. System file
|Que.The ____________ Domain Name Server data will get spread to the ISPs & will be cached there.
|Que.The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship.
|c. May be True or False
|d. Can’t say
|Que.Which of the following data is not appropriate here, if you delete cache, cookies, and browser history?
|a. Address bar predictions
|b. Saved passwords
|c. Browser plug-ins
|d. Shopping cart content
|Que.____________ are tiny files which get downloaded to your system when you visit a website.
|Que.Browser ___________ are impermanent internet files which helps the browsers download web images, data & documents for rapid performance & viewing in the future.
|Que.___________ is just a group of data downloaded for helping in displaying a web page faster.
|Que.Attackers could steal ___________ to achieve illegitimate accessing to online accounts & disturbs the personal information.