Nonetheless, there are different (much less dependable) DNS attacks that may feasibly be carried out without access to the victim’s…