A program that intentionally leaves a security hole or covert method of access is referred to as a ___________.
A.
Logic bomb
B.
Back door
C.
Trojan horse
D.
Honey pot
A program that intentionally leaves a security hole or covert method of access is referred to as a ___________.
A program that intentionally leaves a security hole or covert method of access is referred to as a ___________.
A.
Logic bomb
B.
Back door
C.
Trojan horse
D.
Honey pot