___________ will give you an USB which will contain ___________ that will take control of your system in the background.
(a) Attackers, Trojans
(b) White hat hackers, antivirus
(c) White hat hackers, Trojans
(d) Attackers, antivirus
The question was posed to me in an interview.
I'd like to ask this question from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security