Imagine and describe three general scenarios where network problems, possibly from DNS intrusion, are present. Technically evaluate how an intruder could have inserted or removed DNS messages into the network. Define and analyse possible entry points where the intruder might have possibly gained access to the servers.