COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Logic/Time Bombs malware
A
were designed to lie dormant until a specific logical condition is met
B
tracks users’ keystrokes, obtains passwords, and other personal information
C
is an entry point into a program without it knowing
D
go KABOOM
Explanation: 

Detailed explanation-1: -A logic bomb is software that lays dormant until some specific condition is met. That condition is usually a date and time. When the condition is met, the software does some malicious act, such as delete files, alter system configuration, or perhaps release a virus.

Detailed explanation-2: -The bomb’s “detonator” is the particular condition that must be met. If the trigger is related to a date or time, the logic bomb will go off on a certain date–e.g., Y2K–and is known as a time bomb.

There is 1 question to complete.