Which of the following behind on a compromised system to allow for continued monitoring and access?

After gaining administrative access, a malicious intruder might leave which of the following behind on a compromised system to allow for continued monitoring and access?
A. Trojan horse
B. Logic bomb
C. Spyware
D. Rootkit

CompTIA A+ 220-1102 (Core 1) Exam

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.