What type of malware is typically added to a legitimate program but lies dormant until it is triggered by a specific event?

A. logic bomb
B. spam
C. zombie
D. ransomware


Answer: A

Computer Science & Information Technology

You might also like to view...

The Object class contains the method:

(a) getClass() (b) toString() (c) equals() (d) all of the above

Computer Science & Information Technology

The keyword used in SQL to establish specify the table where the fields can be found is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

To specify length in picas, use the ________ abbreviation

A) pc B) pt C) ps D) pi

Computer Science & Information Technology

A special facial recognition lock will only recognize

A) The facial features of the family who work on the computer B) The digitized photos of family members C) A computer technician who is hired to work on the computer D) The facial features used to lock the computer screen

Computer Science & Information Technology