A user reports that each time they attempt to go to a legitimate website, they are sent to an
inappropriate website. The security administrator suspects the user may have malware on the
computer, which manipulated some of the user's files. Which of the following files on the user's
system would need to be checked for unauthorized changes?
A. SAM
B. LMhosts
C. Services
D. Hosts