Which of the following is an undocumented and illicit point of entry into an operating system or application added by a system's programmers to bypass normal security?

A. back door
B. hole
C. discovery
D. hash


Answer: A

Computer Science & Information Technology

You might also like to view...

What is the purpose of coding the algorithm into instructions written in a programming language?

A. It allows the computer to implement it. B. It helps integrate the circuits. C. It forces the user to learn a new programming language. D. It instructs the computer on what not to do.

Computer Science & Information Technology

By adding ____ tasks to your list, an item that requires attention will not be overlooked.

A. repeating B. automatic C. daily D. academic

Computer Science & Information Technology

Give several reasons why the study of concurrency is appropriate and important for students of operating systems.

What will be an ideal response?

Computer Science & Information Technology

________ is a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights

Fill in the blank(s) with correct word

Computer Science & Information Technology