A malicious program modified entries in the LMHOSTS file of an infected system. Which of the following
protocols would have been affected by this?
The LMHOSTS file provides a NetBIOS name resolution method that can be used for small networks that do
not use a WINS server. NetBIOS has been adapted to run on top of TCP/IP, and is still extensively used for
name resolution and registration in Windows-based environments.