Which of the following DNS poisoning eccouncil video
ethical-hacker video for which of the following DNS poisoning techniques is used by an attacker to infect a victim’s machine with a Trojan and remotely change
Answer
          Full Certification Question
Which of the following DNS poisoning techniques is used by an attacker to infect a victim’s machine with a Trojan and remotely change their DNS IP address to that of the attacker’s?