CompTIA Network+ N10-009 Practice Question
A large organization recently discovered that despite having extensive filtering and blocking measures in place, their internal research documents were being accessed by unauthorized external entities. Upon investigation, it was found that this was achieved through sophisticated manipulation of network responses. Which type of exploit most likely describes this situation?
SQL injection
DNS poisoning
Cross-site scripting (XSS)
Buffer overflow