Which of the following attack types is this?

Ann, a recently terminated programmer, can access the program she wrote without using any login credentials. Which of the following attack types is this?

Ann, a recently terminated programmer, can access the program she wrote without using any login credentials. Which of the following attack types is this?

A.
Trojan

B.
Backdoor

C.
Spyware

D.
Logic bomb



Leave a Reply 0

Your email address will not be published. Required fields are marked *

fourteen − ten =