After gaining administrative access, a malicious intruder might leave which of the following behind on a compromised system to allow for continued monitoring and access?
A. Trojan horse
B. Logic bomb
C. Spyware
D. Rootkit
CompTIA A+ 220-1102 (Core 1) ExamFULL Printable PDF and Software. VALID exam to help you PASS. |