header bg

Scan QR code or get instant email to install app

Question:

Your company outsourced the development of an accounting application to a local programming firm. After three months of using the product, one of your administrators finds that the developers have inserted a way to log in and bypass all security and authentication. Which of the following BEST describes this?

A Backdoor.
explanation

A backdoor is a method for bypassing normal security and directly accessing the system. A logic bomb is a malware that performs its misdeeds when some condition is met. A Trojan horse wraps a malicious program into a legitimate program. When the user downloads and installs the legitimate program, they get the malware. A rootkit is a malware that gets root or administrative privileges.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*