Que: By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.

a. Trojan
b. Virus
c. Antivirus
d. Anti-malware
Answer: Trojan

Leave a Comment