An attacker has installed a RAT on a
host. The attacker wants to ensure that when a user attempts to go to -www.MyPersonalBank.com-, that the user is directed to a phishing site.
Which file does the attacker need to modify?
A. Boot.ini
B. Sudoers
C. Networks
D. Hosts
QUESTION
D
The hosts file is a local plain text file that maps servers or hostnames to IP addresses. so the answer would be D. Sudoers is a list of admins in linux, Networks is a linux file that is used to name networks, boot.ini is a text file that contains the boot options for computers with BIOS firmware running NT-based operating system prior to Windows Vista