Which of the following is a backdoor initiated from inside the target's network that makes it possible to take control of the target even when it's behind a firewall?
A. reverse port
B. back shell
C. reverse shell
D. reverse door
Answer: C
Computer Science & Information Technology
You might also like to view...
All attempts to access text files should be enclosed inside if...else blocks to check forexceptions.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
IPsec encryption works at Layer 3 of the OSI model.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology