This is a dedicated watch page for a single video.
Ken, a professional hacker, has targeted Paul, a bank employee. Ken secretly installed a backdoor Trojan in Paul’s laptop to leverage it and access Paul’s files. After installing the Trojan, Ken obtained uninterrupted access to the target machine and used it for transferring and modifying files. Which of the following types of Trojans did Ken install in the above scenario?