CompTIA Exam Questions

Which of the following is this attack called?

Joe a system administrator receives reports that users attempting to reach the corporate website are
arriving at an unfamiliar website instead. An investigation by a forensic analyst found that the name
server log has several corporate IP addresses that were changed using Joe’s credentials. Which of the
following is this attack called?

A.
Xmas attack

B.
DNS poisoning

C.
Web server attack

D.
Spoofing attack