What type of malware is typically added to a legitimate program but lies dormant until it is triggered by a specific event?
A. logic bomb
B. spam
C. zombie
D. ransomware
Answer: A
Computer Science & Information Technology
You might also like to view...
The Object class contains the method:
(a) getClass() (b) toString() (c) equals() (d) all of the above
Computer Science & Information Technology
The keyword used in SQL to establish specify the table where the fields can be found is ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
To specify length in picas, use the ________ abbreviation
A) pc B) pt C) ps D) pi
Computer Science & Information Technology
A special facial recognition lock will only recognize
A) The facial features of the family who work on the computer B) The digitized photos of family members C) A computer technician who is hired to work on the computer D) The facial features used to lock the computer screen
Computer Science & Information Technology