I’m leaning towards option C, but I’m not completely confident. I just remember that Trojans are mostly about stealthy access rather than hardware control.
I practiced a similar question where we had to identify what malware could do. I feel like keylogging and webcam access are definitely within a Trojan's capabilities.
Kerry
3 months agoLauran
3 months agoFelicia
3 months agoTheodora
4 months agoElfrieda
4 months agoMerilyn
4 months agoMarquetta
4 months agoQuentin
4 months agoJettie
5 months agoLeonor
5 months agoRaina
5 months agoElvera
5 months agoLino
5 months agoEdda
6 months agoFranklyn
10 months agoClement
10 months agoYuonne
9 months agoAvery
9 months agoYoko
9 months agoErnest
10 months agoEthan
9 months agoElizabeth
9 months agoTequila
10 months agoCarey
11 months agoFrancine
10 months agoHubert
10 months agoFrancis
10 months agoLashawnda
11 months agoBrandon
11 months agoGeorgiann
11 months agoEllsworth
11 months agoAnnelle
11 months agoJonell
11 months agoAnnalee
11 months ago