A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware.
(a) crypter
(b) virus
(c) backdoor
(d) key-logger
This question was posed to me by my school teacher while I was bunking the class.
My question is taken from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security