an attacker was able to gain unauthorized access to a mobile phone and install a trojan horse so that he or she could bypass security controls and reconnect later. which type of attack is this an example of?