Answer:
Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.
Previous Question | Next Question |
Explain You are currently designing your own Desktop Publishing application, as you have not found any that? | What is Bastion Host? |