Certified Ethical Hacker (CEHv9) Questions and answers
31. Which of the following is a low-tech way of gaining unauthorized access to systems?
C. Social engineering
32.A hacker has successfully infected an internet-facing server which he will then use to send junk mail,
take part in coordinated attacks, or host junk email content. Which sort of trojan infects this server?