A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:
A) logic bomb
B) Trojan horse
C) virus
D) none of the above
Correct Answer:
Verified
Q32: An example of _ is an adversary
Q33: The three concepts that form the CIA
Q34: A loss of _ is the unauthorized
Q35: The primary mechanism used in implementing denial-of-service
Q36: _ refers to the altering or replacing
Q38: A worm that can attack a variety
Q39: A virus can be attached to a
Q40: Which of the following is a type
Q41: A _ is code embedded in some
Q42: A _ propagates itself and activates itself,whereas
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents