Is malware that arrives in a Trojan disguised as legitimate software and sets up a secret communication link to a hacker?

55. Which of the following sequence of events best describes an online intrusion?a.Malware enters the device, and then opens a backdoor, which opens a communications link on thedevice that a hacker can exploit.b.A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.c.A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access tothe device.d.None of the above.56. A(n) ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secretcommunication link to a hacker.a.DDoSb.TLS