The greatest risk resulting from a DNS cache poisoning attack is the loss of sensitive data. Here’s why:
DNS Cache Poisoning: An attacker corrupts the DNS cache to redirect users from legitimate sites to
malicious ones.
Phishing and Data Theft: Users think they are accessing legitimate websites (like banking portals) but
are unknowingly entering sensitive data into fake sites.
Man-in-the-Middle (MitM) Attacks: Attackers can intercept data traffic, capturing credentials or
personal information.
Data Exfiltration: Once credentials are stolen, attackers can access internal systems, leading to data
loss.
Other options analysis:
A . Reduced system availability: While DNS issues can cause outages, this is secondary to data theft in
poisoning scenarios.
B . Noncompliant operations: While potential, this is not the primary risk.
C . Loss of network visibility: Unlikely since DNS poisoning primarily targets user redirection, not
network visibility.
CCOA Official Review Manual, 1st Edition Reference:
Chapter 4: Network Security Operations: Discusses DNS attacks and their potential consequences.
Chapter 8: Threat Detection and Incident Response: Details how DNS poisoning can lead to data
compromise.