Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?
A. Firmware
B. Rootkits
C. SQL injection
D. Cross-side scripting
CompTIA exam questions
Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?
A. Firmware
B. Rootkits
C. SQL injection
D. Cross-side scripting