A secret entry point into a program that allows intruders aware of the breached
area to gain access and bypass the usual security access procedures is called a:
A. logic bomb B. Trojan horse
C. virus D. none of the above
D
Business
You might also like to view...
Which of the following families tend to be matriarchal?
a. Canadian families b. Spanish families c. Islamic believers d. Jewish families
Business
In a competitive orientation to negotiations between buyer and supplier, the buyer does not always possess the power in the relationship—the supplier sometimes holds the power and can exercise this power during negotiations with the buyer
Indicate whether the statement is true or false
Business