An analyst receives multiple alerts for beaconing activity for a host on the network. After analyzing the activity,
the analyst observes the following activity:
A user enters comptia.org into a web browser.
The website that appears is not the comptia.org site.
The website is a malicious site from the attacker.
Users in a different office are not having this issue.
Which of the following types of attacks was observed?
A. On-path attack
B. DNS poisoning
C. Locator (URL) redirection
D. Domain hijacking
the analyst observes the following activity:
A user enters comptia.org into a web browser.
The website that appears is not the comptia.org site.
The website is a malicious site from the attacker.
Users in a different office are not having this issue.
Which of the following types of attacks was observed?
A. On-path attack
B. DNS poisoning
C. Locator (URL) redirection
D. Domain hijacking