Which of the following components of a remote access Trojan runs on the victim's machine?
a. Client
b. Server
c. Port
d. Remote access
ANS: B
Computer Science & Information Technology
You might also like to view...
The ____________ command displays the route packets take between two computers.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ____ is simply a folder that provides a convenient grouping for classes.
A. constructor B. block C. composition D. package
Computer Science & Information Technology