Jane, an IT security technician, receives a call from the vulnerability assessment team informing
her that port 1337 is open on a user’s workstation. Which of the following BEST describes this
type of malware?
A.
Logic bomb
B.
Spyware
C.
Backdoor
D.
Adware