A trojan was recently discovered on a server. There are now concerns that there has been a
security breach that allows unauthorized people to access data. The administrator should be
looking for the presence of a/an:
A.
Logic bomb.
B.
Backdoor.
C.
Adware application.
D.
Rootkit.