1.

By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.

A. Trojan
B. Virus
C. Antivirus
D. Anti-malware
Answer» B. Virus


Discussion

No Comment Found