Which of the following is a program or set of instructions in a program that allows users to bypass security controls?

A. keygens
B. indices
C. rootkit
D. back door


Answer: D

Computer Science & Information Technology

You might also like to view...

This vector function removes an item from a vector.

a. remove_item b. delete_item c. erase d. pop_back

Computer Science & Information Technology

Explain why inheritance is useful.

What will be an ideal response?

Computer Science & Information Technology

A connection between two tables in an OpenOffice Base database is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ is a free edition of SQL Server that is created for mobile devices and for mobile application developers.

A. Workgroup Edition B. Compact 3.5 C. SQL Server Express Edition D. Web Edition

Computer Science & Information Technology