Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?
A) denial-of-service attack
B) logic bomb
C) botnet
D) rootkit
Correct Answer:
Verified
Q19: A security policy outlines exactly what needs
Q20: A spear phishing attack typically employs a
Q21: A network attack in which an intruder
Q22: Installation of a corporate firewall is the
Q23: In computing, a term for any sort
Q25: Which of the following is a federal
Q26: Which of the following is a partnership
Q27: Which of the following concepts recognizes that
Q28: Discussing security attacks through public trials and
Q29: Software and/or hardware that monitors system and
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents