A program that intentionally leaves a security hole or covert method of access is referred to as a
___________.
A.
Logic bomb
B.
Back door
C.
Trojan horse
D.
Honey pot
A program that intentionally leaves a security hole or covert method of access is referred to as a
___________.
A program that intentionally leaves a security hole or covert method of access is referred to as a
___________.
A.
Logic bomb
B.
Back door
C.
Trojan horse
D.
Honey pot