An attacker may poison the DNS by making changes to an organization's DNS table. Why might an attacker take this action?
a) To improve network performance
b) To enhance data security
c) To redirect traffic to malicious sites
d) To comply with DNS regulations