A malicious program modified entries in the LMHOSTS file of an infected system. Which of the
following protocols would have been affected by this?

A.
ICMP
B.
BGP
C.
NetBIOS
D.
DNS
Explanation:
The LMHOSTS file provides a NetBIOS name resolution method that can be used for small
networks that do not use a WINS server. NetBIOS has been adapted to run on top of TCP/IP, and
is still extensively used for name resolution and registration in Windows-based environments.