Jane, an IT security technician, receives a call from the vulnerability assessment team informing her that port 1337 is open on a users workstation. Which of the following BEST describes this type of malware?
A.
Logic bomb
B.
Spyware
C.
Backdoor
D.
Adware