COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Logic/Time Bombs malware
|
were designed to lie dormant until a specific logical condition is met
|
|
tracks users’ keystrokes, obtains passwords, and other personal information
|
|
is an entry point into a program without it knowing
|
|
go KABOOM
|
Explanation:
Detailed explanation-1: -A logic bomb is software that lays dormant until some specific condition is met. That condition is usually a date and time. When the condition is met, the software does some malicious act, such as delete files, alter system configuration, or perhaps release a virus.
Detailed explanation-2: -The bomb’s “detonator” is the particular condition that must be met. If the trigger is related to a date or time, the logic bomb will go off on a certain date–e.g., Y2K–and is known as a time bomb.
There is 1 question to complete.