Which of the following is an attack designed to activate based on time?

Which of the following is an attack designed to activate based on time?

Which of the following is an attack designed to activate based on time?

A.
Logic Bomb

B.
Backdoor

C.
Trojan

D.
Rootkit



Leave a Reply 0

Your email address will not be published. Required fields are marked *

17 − thirteen =