Malicious code that enters a target system, lays dormant until a user opens the certain program
then deletes the contents of attached network drives and removable storage devices is known as
a:
A.
Trojan horse
B.
honeypot
C.
logic bomb
D.
worm
Malicious code that enters a target system, lays dormant until a user opens the certain program
then deletes the contents of attached network drives and removable storage devices is known as
a:
Malicious code that enters a target system, lays dormant until a user opens the certain program
then deletes the contents of attached network drives and removable storage devices is known as
a:
A.
Trojan horse
B.
honeypot
C.
logic bomb
D.
worm