1.

ONCE_ACTIVATED,_____________CAN_ENABLE_____________TO_SPY_ON_THE_VICTIM,_STEAL_THEIR_SENSITIVE_INFORMATION_&_GAIN_BACKDOOR_ACCESS_TO_THE_SYSTEM.?$

A. virus, cyber-criminals
B. malware, penetration testers
C. trojans, cyber-criminals
D. virus, penetration testers
Answer» D. virus, penetration testers


Discussion

No Comment Found