Which one of the following is designed to execute malicious actions when a certain event occurs or a specific time period elapses?
a. Spyware
b. DDoS
c. Logic bomb
d. Botnet
Answer: c. Logic bomb
Computer Science & Information Technology
You might also like to view...
What is an advantage of applying Java 8 lambda expressions to a Collection class?
(a) The potential for syntax errors is reduced (b) The JVM can parallelize operations applied to elements of the collection (c) The collection can be displayed graphically (d) Lambda expressions help map the collection to a database
Computer Science & Information Technology
A(n) ________ is a variation of the theme you have chosen
Fill in the blank(s) with correct word
Computer Science & Information Technology
What are the characteristics of a network designated 10BASE5?
What will be an ideal response?
Computer Science & Information Technology
To register the Active Directory schema snap-in, open a command prompt and type regsvr32 schmmgmt.dll
Indicate whether the statement is true or false
Computer Science & Information Technology