Risa is the security administrator for her organization and has just completed a routine server audit. She did not notice any abnormal activity. However, another network security analyst finds connections to unauthorized ports from outside the organization's network. Using security tools, the analyst finds hidden processes that are running on the server. What has most likely been installed on the server?