datmathguy4373 datmathguy4373 19-12-2022 Computers and Technology contestada an attacker was able to gain unauthorized access to a mobile phone and install a trojan horse so that he or she could bypass security controls and reconnect later. which type of attack is this an example of?