COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Time bombs____.
A
Can infect and spread but need human assistance
B
Can infect and spread without human assistance
C
Track users’ keystrokes, obtains passwords and other personal information
D
Are designed to lie dormant until a specific logical condition is met
Explanation: 

Detailed explanation-1: -A logic bomb is a malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date (also called a time bomb). Malware such as worms often contain logic bombs, behaving in one manner, then changing tactics on a specific date and time.

Detailed explanation-2: -Logic Bomb: A logic bomb is a type of Trojan Horse that executes when specific conditions occur. Triggers for logic bombs can include a change in a file, by a particular series of keystrokes, or at a specific time or date.

Detailed explanation-3: -Trojan horse. Was this answer helpful?

Detailed explanation-4: -The bomb’s “detonator” is the particular condition that must be met. If the trigger is related to a date or time, the logic bomb will go off on a certain date–e.g., Y2K–and is known as a time bomb.

There is 1 question to complete.