A suspicious script was found on a sensitive research system. Subsequent analysis determined that proprietary data would have been deleted from both the local server and backup media immediately following a specific administrator’s removal from an employee list that is refreshed each evening.
Which of the following BEST describes this scenario?
A . Backdoor
B . Rootkit
C . Time bomb
D . Logic bomb
Answer: A
Latest CFR-310 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund