A malicious program modified entries in the LMHOSTS file of an infected system. Which of the following protocols would have been affected by this?
A. ICMP
B. BGP
C. NetBIOS
D. DNS
Answer: C. NetBIOS
Computer Science & Information Technology
You might also like to view...
Suggest an advantage and a disadvantage of running a caching-only DNS server at each host?
What will be an ideal response?
Computer Science & Information Technology
A noun would be a good choice for a variable or constant identifier.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) ________ index places as many marked entries and subentries for the indexed item on one line as possible
Fill in the blank(s) with correct word
Computer Science & Information Technology
Podcasts are RSS feeds in which each episode contains an enclosed ____________________ file.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology