Comp TIA Security + Certification Questions Part 6

© examsiri.com
Question : 23 of 68
 
Marks: +1, -0
A security auditor is performing a vulnerability scan to find out if mobile applications used in the organization are secure. The auditor discovers that one application has been accessed remotely with no legitimate account credentials. After investigating, it seems the application has allowed some users to bypass authentication of that application. Which of the following types of malware allow such a compromise to take place? (Choose two.)
Go to Question: