Sara, a security administrator, needs to simplify the management of access to remote files and folders. Which of the following can she implement to BEST
accomplish this?
Jane, an attacker, compromises a payroll system and replaces a commonly executed application with a modified version which appears to run as normal but also
executes additional functions. Which of the following would BEST describe the slightly modified application?