Which type of attack utilizes an unauthorized service or daemon running on your system to send
out information to a hacker that can be used to further compromise the system?
A.
Virus attack
B.
Hijacking attack
C.
Illicit server attack
D.
Man-in-the-middle attack