Which file does the...
 
Notifications
Clear all

Which file does the attacker need to modify?

1 Posts
1 Users
0 Likes
90 Views
(@sitesmario)
Posts: 734
Noble Member
Topic starter
 

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.

Which file does the attacker need to modify?

  • A . Boot.ini
    B. Sudoers
    C. Networks
    D. Hosts

Show Answer Hide Answer

Suggested Answer: D
 
Posted : 28/01/2023 7:49 am
Topic Tags

Latest EC-Council 312-50v12 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: