Which of the following is an attack designed to activate based on date?

A. Logic bomb
B. Backdoor
C. Trojan
D. Rootkit

Answer: A. Logic bomb

Computer Science & Information Technology

You might also like to view...

An I/O request is called a(n) ____ wait in multiprogramming environments.

A. forced B. natural C. scheduled D. indirect

Computer Science & Information Technology

Which filename refers to the physical address support program for accessing more than 4 GB of physical RAM?

a. Hal.dll b. Ntkrnlpa.exe c. BootSect.dos d. Io.sys

Computer Science & Information Technology