What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?
A . The attacker queries a nameserver using the DNS resolver.
B . The attacker makes a request to the DNS resolver.
C . The attacker forges a reply from the DNS resolver.
D . The attacker uses TCP to poison the ONS resofver.
Answer: A