

MCQOPTIONS
Saved Bookmarks
1. |
By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background. |
A. | Trojan |
B. | Virus |
C. | Antivirus |
D. | Anti-malware |
Answer» B. Virus | |