Which of the following is a program or set of instructions in a program that allows users to bypass security controls?
A. keygens
B. indices
C. rootkit
D. back door
Answer: D
Computer Science & Information Technology
You might also like to view...
This vector function removes an item from a vector.
a. remove_item b. delete_item c. erase d. pop_back
Computer Science & Information Technology
Explain why inheritance is useful.
What will be an ideal response?
Computer Science & Information Technology
A connection between two tables in an OpenOffice Base database is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
____ is a free edition of SQL Server that is created for mobile devices and for mobile application developers.
A. Workgroup Edition B. Compact 3.5 C. SQL Server Express Edition D. Web Edition
Computer Science & Information Technology