Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
(a) virus, cyber-criminals
(b) malware, penetration testers
(c) trojans, cyber-criminals
(d) virus, penetration testers
I got this question during a job interview.
Question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security