Watch this video on YouTube
Which of the following DNS poisoning techniques is used by an attacker to infect a victim’s machine with a Trojan and remotely change their DNS IP address to that of the attacker’s?