What tactic does pharming use to achieve its goal?
What tactic does pharming use to achieve its goal?
Pharming is a cyber attack technique aimed at redirecting a website's traffic to a fraudulent website. One common method to achieve this redirection is by modifying the user's Hosts file, which is a local file on a computer that maps hostnames to IP addresses. When the Hosts file is altered to redirect traffic from a legitimate site to a malicious site, the user ends up visiting the wrong, fraudulent website. This tactic is a typical example of how pharming operates.
I think the correct answer is "A". "Pharming is the redirection of a Web site’s actual or intended traffic to a malicious site. Redirection is often accomplished in one of two ways: modification of host files or by taking advantage of weaknesses in DNS services. https://www.techrepublic.com/blog/it-security/hosts-file-pharming-and-other-botnet-recruiting-methods/
The correct answer is A. Pharming redirects a valid internet request to a malicious site by modifying a hosts file and there is not much individuals can do about it except try to use up to date browsers. IAPP - Privacy in Technology, page 150 of the 2014 official publication
The correct answer is A. It modifies the user’s Hosts file. Pharming is a cyber attack intended to redirect a website’s traffic to another, fake site. In order to achieve this, attackers often modify the user’s Hosts file, which is used to look up hostnames of sites on the internet. By changing the Hosts file, the attacker can control which site the user ends up at when they type in a particular URL, leading them to a malicious site instead of the one they intended to visit.
A and C are both correct
Yes, but the question is more focused on how it is achieved - which is "A". The "C" is the outcome.
A is not necessary correct, pharming is action of redirecting to a website controlled by the hacker. The mean to achieve that goal can be tampering with the host file of the victime computer, but it can also be DNS poisoning, or much more easier URL hijacking in a phising email
Should be A