Which file does the attacker need to modify?

Posted by: Pdfprep Category: 312-50v11 Tags: , ,

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.

Which file does the attacker need to modify?
A . Boot.ini
B . Sudoers
C . Networks
D . Hosts

Answer: D

Leave a Reply

Your email address will not be published.