Which of the following malware types is MOST likely to execute its payload after Jane, an employee, has left the company?

A. Rootkit
B. Logic bomb
C. Worm
D. Botnet


Answer: B. Logic bomb

Computer Science & Information Technology

You might also like to view...

Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan.   Is Lance allowed to share the software with Susan?

A. Susan would need to purchase the software from the company. B. Lance purchased the software for work and can share it with coworkers. C. The software is open source, so Lance can share the software with Susan. D. The software was purchase by Lance with a site license and can be used by Susan.

Computer Science & Information Technology

There are ____ classifications of fonts.

A. two B. three C. four D. six

Computer Science & Information Technology

A file's internal name is how the operating system knows the file.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A wireless network _________ is a set of wireless networks available to a given user on a Windows 8.1 computer

Fill in the blank(s) with correct word

Computer Science & Information Technology