A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

A. logic bomb B. trapdoor

C. worm D. Trojan horse


A. logic bomb

Computer Science & Information Technology

You might also like to view...

If you need a function to get both the number of items and the cost per item from a user, which would be a good function declaration to use?

a. int,float getData(); b. int getData(float cost); c. void getData(int count, float cost); d. void getData(int& count, float& cost);

Computer Science & Information Technology

In the case of a(n) ____ incident, the aim of incident response management is to ensure that the nature of the incident is understood in as timely a fashion as possible, and that the best possible response is deployed.

A. expected B. possible C. unforeseen D. probable

Computer Science & Information Technology

With 32-bit processors, you can access up to ____ GB RAM.

A. 2 B. 4 C. 8 D. 16

Computer Science & Information Technology

OpenSSL provides the APIs ____ for Base64 encoding.

A. EVP_B64EncodeBlock B. EVP_Base64EncodeBlock C. EVP_EncodeBlock D. EVP_Base64Block

Computer Science & Information Technology