Q. Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system. (Solved)
1. Virus, Cyber-Criminals
2. Malware, Penetration Testers
3. Trojans, Cyber-Criminals
4. Virus, Penetration Testers
- c. Trojans, Cyber-Criminals