A secret entry point into a program that allows intruders aware of the breached

area to gain access and bypass the usual security access procedures is called a:

A. logic bomb B. Trojan horse

C. virus D. none of the above

D

Business

You might also like to view...

Which of the following families tend to be matriarchal?

a. Canadian families b. Spanish families c. Islamic believers d. Jewish families

Business

In a competitive orientation to negotiations between buyer and supplier, the buyer does not always possess the power in the relationship—the supplier sometimes holds the power and can exercise this power during negotiations with the buyer

Indicate whether the statement is true or false

Business