Which of the following Trojans enables the hacker to turn on the webcam and record audio?
a. Sub Seven
b. Poison ivy
c. GhostRat
d. Tini
ANS: C
Computer Science & Information Technology
You might also like to view...
At a rented house that does not have Internet access, two people need to share files. Neither has a flash drive. What type of network would help in this situation?
A) Bluetooth B) Ad hoc C) WiMAX D) USB
Computer Science & Information Technology
FIGURE EX 4-1 In Figure EX 4-1 above, number 1 is pointing to the ____ button.
A. Show Now B. Calculate Formulas C. Calculate Now D. Calculate Sheet
Computer Science & Information Technology