Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?

Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?

Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?

A.
Firmware

B.
Rootkits

C.
SQL injection

D.
Cross-side scripting



Leave a Reply 0

Your email address will not be published. Required fields are marked *