A malicious program modified entries in the LMHOSTS file of an infected system. Which of the following protocols would have been affected by this?

A. ICMP
B. BGP
C. NetBIOS
D. DNS


Answer: C. NetBIOS

Computer Science & Information Technology

You might also like to view...

Suggest an advantage and a disadvantage of running a caching-only DNS server at each host?

What will be an ideal response?

Computer Science & Information Technology

A noun would be a good choice for a variable or constant identifier.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ________ index places as many marked entries and subentries for the indexed item on one line as possible

Fill in the blank(s) with correct word

Computer Science & Information Technology

Podcasts are RSS feeds in which each episode contains an enclosed ____________________ file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology