Answer:
Attackers can exploit the lack of encryption by intercepting and modifying unencrypted DNS requests, redirecting users to malicious websites and performing DNS spoofing attacks.
Attackers can exploit the lack of encryption by intercepting and modifying unencrypted DNS requests, redirecting users to malicious websites and performing DNS spoofing attacks.
You may be interested in:
Web Security MCQs