#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Infecting a victim system with a computer trojan, backdoor or other malware application of this type that ensures the attacker’s presence in the target environment;

Answer

Installation