Which of the following components of a remote access Trojan runs on the victim's machine?

a. Client
b. Server
c. Port
d. Remote access

ANS: B

Computer Science & Information Technology

You might also like to view...

The ____________ command displays the route packets take between two computers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____ is simply a folder that provides a convenient grouping for classes.

A. constructor B. block C. composition D. package

Computer Science & Information Technology