A program that intentionally leaves a security hole or covert method of access is referred to as a ___________.

A program that intentionally leaves a security hole or covert method of access is referred to as a ___________.

A program that intentionally leaves a security hole or covert method of access is referred to as a ___________.

A.
Logic bomb

B.
Back door

C.
Trojan horse

D.
Honey pot



Leave a Reply 0

Your email address will not be published. Required fields are marked *