ISC Exam Questions

which can be called any of the following terms, except:

Kirk is a software developer who is diligently writing code for a new program. To save time, he creates a hidden access point within the program so that he can immediately begin work and bypass the security controls. Kirk has created a mechanism which can be called any of the following terms, except:

A.
Maintenance hook

B.
Backdoor

C.
Malware

D.
Trapdoor

Explanation:
Malware is malicious code designed to exploit a system, such as a
Trojan horse. The other terms all describe hidden access points into a system.