Q. Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
β
Correct Answer: (C)
Trojans, Cyber-Criminals