A user has unknowingly gone to a fraudulent site. The security analyst notices the following
system change on the user’s host:
Old ‘hosts’ file:
127.0.0.1 localhost
New ‘hosts’ file:
127.0.0.1 localhost
5.5.5.5 www.comptia.com
Which of the following attacks has taken place?
A.
Spear phishing
B.
Pharming
C.
Phishing
D.
Vishing