adplus-dvertising
frame-decoration

Question

When a logic bomb is activated by a time related event, it is known as -------

a.

trojan horse

b.

time bomb

c.

virus

d.

time related bomb sequence

Answer: (b).time bomb

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. When a logic bomb is activated by a time related event, it is known as -------

Similar Questions

Discover Related MCQs

Q. -------- are often delivered to a PC through an email attachment and are often designed to do harm.

Q. The altering of data so that it is not usable unless the changes are undone is

Q. VIRUS stands for

Q. What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?

Q. Which of the following is/are threats for electronic payment systems?

Q. A virus that migrates freely within a large population of unauthorized email user is called a -------

Q. -------- are attempts by individuals to obtain confidential information from you to falsifying their identity.

Q. Authentication is

Q. A -------- is a computer program that can replicate itself and spread from one computer to another.

Q. Which of the following virus overtake computer system, when it boots and destroy information?

Q. Key logger is a

Q. To protect yourself from computer hacker, you should turn on a

Q. Firewalls are used to protect against --------

Q. Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?

Q. -------- software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.

Q. Code red is a(n) ----------

Q. Which of the following would most likely not be a symptom of a virus?

Q. …………….. are used in denial of service attacks, typically against targeted web sites.

Q. Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase

Q. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.