InterviewSolution
Saved Bookmarks
| 1. |
By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.(a) Trojan(b) Virus(c) Antivirus(d) Anti-malwareThis question was posed to me by my college professor while I was bunking the class.The doubt is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct CHOICE is (a) Trojan |
|