In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?
Illicit zone transfer attack
DNS poisoning attack
Illicit poisoning attack
DNS transfer attack
Submit