Ann, a software developer, has installed some code to reactivate her account one week after her
account has been disabled. Which of the following is this an example of? (Select TWO).
A.
Rootkit
B.
Logic Bomb
C.
Botnet
D.
Backdoor
E.
Spyware
Ann, a software developer, has installed some code to reactivate her account one week after her
account has been disabled. Which of the following is this an example of? (Select TWO).
Ann, a software developer, has installed some code to reactivate her account one week after her
account has been disabled. Which of the following is this an example of? (Select TWO).
A.
Rootkit
B.
Logic Bomb
C.
Botnet
D.
Backdoor
E.
Spyware