A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
A. logic bomb B. trapdoor
C. worm D. Trojan horse
A. logic bomb
You might also like to view...
If you need a function to get both the number of items and the cost per item from a user, which would be a good function declaration to use?
a. int,float getData(); b. int getData(float cost); c. void getData(int count, float cost); d. void getData(int& count, float& cost);
In the case of a(n) ____ incident, the aim of incident response management is to ensure that the nature of the incident is understood in as timely a fashion as possible, and that the best possible response is deployed.
A. expected B. possible C. unforeseen D. probable
With 32-bit processors, you can access up to ____ GB RAM.
A. 2 B. 4 C. 8 D. 16
OpenSSL provides the APIs ____ for Base64 encoding.
A. EVP_B64EncodeBlock B. EVP_Base64EncodeBlock C. EVP_EncodeBlock D. EVP_Base64Block