Which of the following is an attack designed to activate based on date?

A. Logic bomb
B. Backdoor
C. Trojan
D. Rootkit


Answer: A. Logic bomb

Computer Science & Information Technology

You might also like to view...

FlowLayout is ________.

a. an abstract class b. a way of organizing components vertically c. the simplest layout manager d. left-aligned by default

Computer Science & Information Technology

Many tasks can be performed with SQL Server Management Studio, but to delete a database, you need to use a SQL statement in the SQLCMD command prompt.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

All of the following methods can be used to show how a transition will appear EXCEPT:

A) the Live Preview feature. B) the Preview button on the TRANSITION tab. C) the view Animations icon on the ANIMATIONS tab. D) the Play Animations icon in the Slide pane.

Computer Science & Information Technology

Passphrases are less secure than passwords.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology