A trojan was recently discovered on a server. There are now concerns that there has been a
security breach that allows unauthorized people to access data. The administrator should be
looking for the presence of a/an:
A.
logic bomb.
B.
backdoor.
C.
adware application.
D.
rootkit.