A trojan was recently discovered on a server. There are now concerns that there has been a security breach that allows unauthorized people to access data. The administrator should be looking for the presence of a/an:
 
A.
logic bomb.
B.
backdoor.
C.
adware application.
D.
rootkit.
 			
			
 
                
B
0
0