What is a Pharming Attack? - Definition & Examples


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

In a pharming attack, the goal of the criminal is to _____.

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. DNS cache poisoning does not affect _____.

2. The DNS cache acts as _____.

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

Use these questions to find out what you know about pharming attacks. You will be asked to explain how pharming attacks work.

Quiz & Worksheet Goals

In this quiz/worksheet set you'll see if you understand:

  • The general targets of a pharming attack
  • What is affected by DNS cache poisoning
  • The goal of a pharming attack

Skills Practiced

  • Critical thinking - apply relevant concepts to examine information about DNS cache poisoning and how it affects a computer system in a different light
  • Information recall - access the knowledge you've gained regarding what the DNS cache does
  • Knowledge application - use your knowledge to answer questions about what the goal of pharming attacks is and who are generally targeted by them

Additional Learning

If you would like to know more about this type of digital attack, review the lesson titled What is a Pharming Attack? - Definition & Examples. This lesson covers new topics, such as:

  • Why pharming attacks are successful
  • How pharming attacks differ from phishing attacks
  • The type of data a pharming attacker hopes to steal