ISC Exam Questions

A program that intentionally leaves a security hole or covert method of access is referred to as a _

A program that intentionally leaves a security hole or covert method of access is referred to as a ___________.

A.
Logic bomb

B.
Back door

C.
Trojan horse

D.
Honey pot