A ________ is hidden computer code that does not replicate but sits dormant on your system until a certain event or set of circumstances triggers it into action.
a. logic bomb
b. virus
c. worm
d. time bomb
Answer: a. logic bomb
You might also like to view...
Which of the following is designed to get an organization back to full functionality as soon as possible after a disaster?
A) Business continuity plan B) Disaster recovery plan C) Backup plan D) Fault tolerance plan
When is a return statement required inside a function?
A. Every function must include at least one return statement. B. When you use a switch statement. C. When a return datatype (other than void) is included in the function prototype. D. Inside an if-else statement.
Hyperlinks are active only when ____.
A. you run the presentation B. you are creating the presentation in Normal view C. you are creating the presentation in Reading view D. you are creating the presentation in Slide Sorter view
The vulnerability ________ discloses the risks that are detected after scanning the network.
A. methodology B. score C. research D. report