Watch this video on YouTube
Which of the following techniques is used by an attacker to deploy a Trojan through a legal channel for securely transferring data or information in a company network?