A __________ is a program inserted into software that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

A. logic bomb
B. trapdoor
C. worm
D. Trojan horse


A. logic bomb

Computer Science & Information Technology

You might also like to view...

The bool data type

A) can be used to store a single character. B) has only two values: true and false. C) is used to store extra-large numbers. D) is used to represent numbers in E notation. E) does none of the above.

Computer Science & Information Technology

What should an outside auditing firm be asked to sign before conducting a security audit?

A. subpoena B. nondisclosure agreement C. search and seizure contract D. social engineering covenant

Computer Science & Information Technology

The paragraph element shown in the accompanying figure is a block-level element.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In regard to SkyDrive security levels, a setting of ________ means that only the user can access this file

A) some friends B) friends C) my friends and their friends D) me

Computer Science & Information Technology