___________ will give you an USB which will contain ___________ that will take control of your system in the background.
(a) Attackers, Trojans
(b) White hat hackers, antivirus
(c) White hat hackers, Trojans
(d) Attackers, antivirus
The question was posed to me in an interview.
I'd like to ask this question from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,