Which type of attack will most effectively maintain remote access and control over the victims computer
Phising
Trojans
XSS
RootKits
Submit