Que: By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background. a. Trojan b. Virus c. Antivirus d. Anti-malware Answer: Trojan