What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?
A. script
B. logic bomb
C. macro virus
D. metamorphic virus
Answer: B
You might also like to view...
?Without styles applied to a table, all the columns appear to run together.
Answer the following statement true (T) or false (F)
The Kerberos server issues a special token or ticket to its authenticated users and it uses this ticket to validate user access to a resource or a service. This process is called which of the following?
a. Pre-authorization b. Prior authorization c. Single sign-on d. Multi-layer sign-on
Match the following results with the proper comparison operators:
I. Does not equal 5000 II. Is less than 5000 III. Is less than or equal to 5000 IV. Is greater than 5000 V. Is greater than or equal to 5000 A. <5000 B. <=5000 C. >=5000 D. >5000 E. <>5000
Pointers to functions are possible because function ____ are themselves pointer constants.
a. classes b. methods c. names d. values