Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
(a) Rootkits
(b) Backdoors
(c) Trojans
(d) Wireshark
I had been asked this question during an online interview.
This intriguing question comes from Generic Steps for Security topic in portion Cyber Security of Cyber Security