78.2k views
5 votes
Karen is a hacker. She wants to access a server and control it remotely. The tool she plans to use is a type of Trojan. What tool will Karen use for this purpose?

a) Keylogger
b) Rootkit
c) Logic Bomb
d) Remote Access Trojan (RAT)

1 Answer

6 votes

Final answer:

The tool that Karen would use as a hacker to remotely access and control a server is a Remote Access Trojan (RAT).

Step-by-step explanation:

The tool that Karen would use to access a server and control it remotely is a Remote Access Trojan (RAT). Unlike the other options, a RAT allows hackers to gain control over a system without the user's knowledge. Hackers use RATs to remotely connect to a victim's computer, giving them the ability to monitor user behavior, access confidential information, take screenshots, and even activate the camera and microphone. A keylogger is also a hacking tool, but it is primarily used to record the keystrokes on a user's device. A rootkit is aimed at hiding the presence of certain processes or programs from normal detection methods, providing continued privileged access to a computer. Lastly, a logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. However, for remote control and access, the RAT is the correct tool.

User Porculus
by
6.9k points