1.

_________ programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.

A. Zombie
B. Worm
C. Trojan Horses
D. Logic Bomb
Answer» D. Logic Bomb


Discussion

No Comment Found