An attacker has installed a RAT on a
host. The attacker wants to ensure that when a user attempts to go to -www.MyPersonalBank.com-, that the user is directed to a phishing site.
Which file does the attacker need to modify?
A. Boot.ini
B. Sudoers
C. Networks
D. Hosts
QUESTION