Laura is operating from her home network. After she accesses a company website, she calls the IT department claiming that she is being presented with a defaced website with suspicious-looking content. Upon investigation of the website, the IT department sees no issues, and a log review shows that no files have been changed.
Which of the following answers might explain the cause?
A) SQL injection
B) ARP poisoning
C) DNS poisoning
D) MAC spoofing