Which of the following is an undocumented and illicit point of entry into an operating system or application added by a system's programmers to bypass normal security?

A. back door
B. hole
C. discovery
D. hash

Answer: A

Computer Science & Information Technology

You might also like to view...

____________ is the feature that works with Windows Backup to enable the back up of all files, including those that an application might have open currently

a. Restore copies b. File copies c. Volume shadow copies d. Distributed folders

Computer Science & Information Technology

A synthetic program is most useful for __________.

a) thoroughly evaluating a system b) determining which of two file systems performs better on a particular system c) isolating which operating system primitives are causing bottlenecks in the system's daily use d) predicting the performance of a system that has not yet been built

Computer Science & Information Technology