What type of DNS attack is indicated by an administrator's workstation being compromised to change DNS information?

Study for the Security+ Master Deck Test. Prepare with flashcards and multiple-choice questions. Gain confidence and ace your certification exam with ease!

The situation described involves an administrator's workstation being compromised specifically to change DNS information, which aligns closely with the characteristics of a DNS hijacking attack. In DNS hijacking, an attacker gains control over a DNS server or the means to manipulate DNS settings, allowing them to redirect traffic to malicious sites or alter DNS records for legitimate services. This might involve compromising an administrator's system to access and modify DNS configurations, making it possible for the attacker to control how devices resolve domain names.

In contrast, DNS spoofing can involve more generic tactics where false DNS responses are provided without necessarily compromising an administrative device. DNS poisoning refers to corrupting the cache of a DNS server with incorrect information, which could occur through various vulnerabilities but doesn't explicitly suggest control over an administrative machine. DNS amplification is a type of DDoS attack that exploits certain DNS protocols to overwhelm a target with traffic, lacking any context of changing DNS data.

Thus, the identification of a DNS hijacking attack in this scenario is accurate because it directly describes the manipulation of DNS settings through control over an administrator's workstation.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy