Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
An attacker has installed a RAT on a host. The attacker now has control of the machine through the RAT. The attacker wants to now ensure that if the user attempts to go to www.mybank.com that the user is directed to a phishing site. Which file does the attacker need to modify to make this happen?
Sudoers
Networks
Boot.ini
Hosts
Utter nonsense! Why is one hosts incorrect and the other is correct? [answer: becuase host can be use for DNS requests like dig/nslookup and host ]
This was on the CEH Test taken 2-15-2016
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.