_____________ can be attained by the use of malware or by changing the server’s settings.
(a) DNS poisoning
(b) DNS cracking
(c) DNS hijacking
(d) DNS redirecting
This question was addressed to me in final exam.
The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security