Watch this video on YouTube
In which of the following techniques does an attacker use cache poisoning to redirect the connection between an IP address and its target server?