Which of the following malware types is MOST likely to execute its payload after Jane, an employee, has left the company?
Select the appropriate attack from each drop down list to label the corresponding illustrated attack.