1.

By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.(a) Trojan(b) Virus(c) Antivirus(d) Anti-malwareThis question was posed to me by my college professor while I was bunking the class.The doubt is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct CHOICE is (a) Trojan

Explanation: By gaining access to the Trojaned system the ATTACKER can stage different types of attack using that Trojan PROGRAM running in the BACKGROUND when the infected user’s system goes ONLINE.



Discussion

No Comment Found

Related InterviewSolutions