Which of the following types of malware eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for which of the following types of malware remains dormant until the user performs an online financial transaction, replicates itself on

Full Certification Question

Which of the following types of malware remains dormant until the user performs an online financial transaction, replicates itself on the computer, and edits the registry entries each time the computer starts?