A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
A. logic bomb B. trapdoor
C. worm D. Trojan horse
A. logic bomb
Computer Science & Information Technology
You might also like to view...
Word's ________ feature helps you customize how tracked changes are displayed in your document
A) OneDrive B) Markup C) Works Cited D) Track Changes
Computer Science & Information Technology
A transparent bridge creates the internal port table by using a form of ____.?
A. ?forward learning B. ?backward correction C. ?backward learning D. ?forward correction
Computer Science & Information Technology