By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.
(a) Trojan
(b) Virus
(c) Antivirus
(d) Anti-malware
This question was posed to me by my college professor while I was bunking the class.
The doubt is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security