header bg

Scan QR code or get instant email to install app

Question:

Jason is at home, attempting to access his music store's website. When he visits the website, he is greeted with a basic form that requests his name, email address, and phone number. This is not the website of a music retailer. Jason is certain that the website has been hacked. How did the attacker accomplish the hack?

A DNS cache poisoning
explanation

Related Information