MCQOPTIONS
Saved Bookmarks
| 1. |
By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background. |
| A. | Trojan |
| B. | Virus |
| C. | Antivirus |
| D. | Anti-malware |
| Answer» B. Virus | |