Information Technology Specialist (ITS) Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Information Technology Specialist Cybersecurity Exam with our quiz. Featuring flashcards and multiple-choice questions, each with hints and explanations. Get ready to ace your IT cybersecurity exam seamlessly.

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which type of attack occurs when an attacker compromises a company's server to reroute a specific domain name to a fraudulent website?

  1. SQL Injection

  2. Denial of Service

  3. DNS Spoofing

  4. Phishing

The correct answer is: DNS Spoofing

The scenario described is a clear instance of DNS Spoofing. This type of attack involves an attacker manipulating or compromising the Domain Name System (DNS) to redirect users from a legitimate website to a fraudulent one. When a specific domain name is entered, rather than the traffic being directed to the intended server, it is rerouted to a malicious site controlled by the attacker. This tactic allows the attacker to potentially capture sensitive information, such as login credentials or financial data, as users believe they are interacting with a legitimate website. This makes DNS Spoofing particularly disruptive and dangerous for both users and organizations. Other types of attacks mentioned do not align with this description. SQL Injection involves injecting malicious SQL queries into an application to manipulate databases, Denial of Service aims to disrupt service availability primarily by overwhelming resources, and Phishing typically refers to attempts to trick users into providing personal information through emails or messages rather than directly manipulating DNS records. Understanding these distinctions helps clarify why DNS Spoofing is the most fitting answer in this case.