Multiple Choice
A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a:
A) shadow bomb.
B) logic bomb.
C) super-program.
D) turtle.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q53: Because successful criminal prosecution of intellectual property
Q54: Perverted Justice is an Internet-based organization that
Q55: Spyware is most commonly used to infiltrate
Q56: It may be possible to retrieve electronic
Q57: A computer program such as Google Chrome
Q59: Computer crimes can also include hidden messages
Q60: Most e-crimes are handled without involving legal
Q61: Electronic evidence is fragile.
Q62: The USA PATRIOT Act, signed by President
Q63: Computer disks should be stored away from:<br>A)magnetic