Which attack defines a piece of code that is inserted into software to trigger a malicious function?
A) Phishing
B) Salami
C) Back door
D) Logic bomb
Correct Answer:
Verified
Q276: In which identity management process is the
Q277: Which technology is a prerequisite for populating
Q278: Which of the following is a PRIMARY
Q279: Which of the following practices provides the
Q280: The Structured Query Language (SQL) implements Discretionary
Q282: Which of the following mechanisms will BEST
Q283: Configuring a Wireless Access Point (WAP) with
Q284: Which of the following is the BEST
Q285: Which of the following actions MUST be
Q286: Which of the following management process allows
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents