A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

A. logic bomb B. trapdoor

C. worm D. Trojan horse

A. logic bomb

Computer Science & Information Technology

You might also like to view...

Word's ________ feature helps you customize how tracked changes are displayed in your document

A) OneDrive B) Markup C) Works Cited D) Track Changes

Computer Science & Information Technology

A transparent bridge creates the internal port table by using a form of ____.?

A. ?forward learning B. ?backward correction C. ?backward learning D. ?forward correction

Computer Science & Information Technology