Joe a system administrator receives reports that users attempting to reach the corporate website
are arriving at an unfamiliar website instead. An investigation by a forensic analyst found that the
name server log has several corporate IP addresses that were changed using Joe’s credentials.
Which of the following is this attack called?

A.
Xmas attack
B.
DNS poisoning
C.
Web server attack
D.
Spoofing attack