FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The ____ is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events.
A
Trap doors
B
Trojan horse
C
Logic Bomb
D
Virus
Explanation: 

Detailed explanation-1: -The correct answer is Trap doors. The Trap doors are code that recognizes some special sequence of input or is triggered by being run from a certain user ID by an unlikely sequence of events.

Detailed explanation-2: -The correct answer is Logic Bomb. A logic bomb is a piece of code inserted into an operating system or software application that implements a malicious function after a certain time limit or specific conditions are met.

Detailed explanation-3: -Definition(s): A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

Detailed explanation-4: -Trojan horse programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.

There is 1 question to complete.