Joe, a system administrator, receives reports that users attempting to reach the corporate website are arriving
at an unfamiliar website instead. An investigation by a forensic analyst found that the name server log has
several corporate IP addresses that were changed using Joe’s credentials.
Which of the following is this attack called?
Web server attack