Which of the following is an attack designed to activate based on date?
A. Logic bomb
B. Backdoor
C. Trojan
D. Rootkit
Answer: A. Logic bomb
Computer Science & Information Technology
You might also like to view...
An I/O request is called a(n) ____ wait in multiprogramming environments.
A. forced B. natural C. scheduled D. indirect
Computer Science & Information Technology
Which filename refers to the physical address support program for accessing more than 4 GB of physical RAM?
a. Hal.dll b. Ntkrnlpa.exe c. BootSect.dos d. Io.sys
Computer Science & Information Technology