Video upload date:  · Duration: PT1H46M27S  · Language: EN

Ken, a professional hacker, has targeted eccouncil video

ethical-hacker video for ken, a professional hacker, has targeted Paul, a bank employee. Ken secretly installed a backdoor Trojan in Paul’s laptop to leverage

This is a dedicated watch page for a single video.

Full Certification Question

Ken, a professional hacker, has targeted Paul, a bank employee. Ken secretly installed a backdoor Trojan in Paul’s laptop to leverage it and access Paul’s files. After installing the Trojan, Ken obtained uninterrupted access to the target machine and used it for transferring and modifying files. Which of the following types of Trojans did Ken install in the above scenario?