A hacker wants to infiltrate a target’s computer to plant malware that allows them undetected privileged access to control the computer. What type of malware would the hacker want to use?
Operating Systems | |
Security | |
Software Troubleshooting | |
Operational Procedures |