A trojan was recently discovered on a server. There are now concerns that there has been a security breach that allows unauthorized people to access data. The administrator should be looking for the presence of a/an:
A.
logic bomb.
B.
backdoor.
C.
adware application.
D.
rootkit.
B