Exam4Training

Which of the following BEST describes this scenario?

A suspicious script was found on a sensitive research system. Subsequent analysis determined that proprietary data would have been deleted from both the local server and backup media immediately following a specific administrator’s removal from an employee list that is refreshed each evening.

Which of the following BEST describes this scenario?
A . Backdoor
B . Rootkit
C . Time bomb
D . Logic bomb

Answer: A

Latest CFR-310 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version