To install backdoors, hackers generally prefer to use:
A. either Trojan horse or computer worm.
B. either Tripwire or computer virus.
C. either eavedropper or computer worm.
D. either Trojan horse or eavedropper.
E. None of the choices.
A. either Trojan horse or computer worm.
B. either Tripwire or computer virus.
C. either eavedropper or computer worm.
D. either Trojan horse or eavedropper.
E. None of the choices.