Que: Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?

a. Rootkits
b. Backdoors
c. Trojans
d. Wireshark
Answer: Wireshark

Leave a Comment