There is just one thing I want to correct in the good answer of @JoedeLyes: Tor has no control over the traffic between the exist node and the destination server. I mean it can not encrypt in anyway the communication between the exit node and the destination server, and that is one of the weaknesses of Tor because exit nodes are vulnerable to eavesdrop.
As for disabling JavaScript it is a matter of pros and cons: when you whitelist websites by disabling JS when you visit them your behavior becomes a sort of a cookie that makes you recognizable and you're not that strongly anonymous anymore. But disabling it protects you from browser vulnerabilities too. But you have to know that JS is enabled by default in Tor browser.
Talking about DNS requests being forwarded to malicious targets, that sounds extremely difficult regarding how Tor nodes function, however it is claimed that NSA redirects identified Tor users to another set of its own secret Internet servers.