An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to
“www.MyPersonalBank.com”, that the user is directed to a phishing site.
Which file does the attacker need to modify?
A.
Hosts
B.
Sudoers
C.
Boot.ini
D.
Networks
Explanation:
The hosts file is a computer file used by an operating system to map hostnames to IP addresses. The hosts file
contains lines of text consisting of an IP address in the first text field followed by one or more host names.
https://en.wikipedia.org/wiki/Hosts_(file)