Kirk is a software developer who is diligently writing code for a new program. To save time, he creates a hidden access point within the program so that he can immediately begin work and bypass the security controls. Kirk has created a mechanism which can be called any of the following terms, except:
A.
Maintenance hook
B.
Backdoor
C.
Malware
D.
Trapdoor
Explanation:
Malware is malicious code designed to exploit a system, such as a
Trojan horse. The other terms all describe hidden access points into a system.