What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it quizlet?

A program that performs a malicious activity at a specific time or after a triggering event.

A logic bomb is a program that performs a malicious activity at a specific time or after a triggering event. Logic bombs can be planted by a virus, a Trojan horse, or an intruder. Logic bombs may perform their malicious activity at a specific time and date or when a specific event occurs on the system, such as logging in, accessing an online bank account, or encrypting a file.

A type of malicious code similar to a virus whose primary purpose is to duplicate itself and spread, while not necessarily intentionally damaging or destroying resources, is a worm.

A program that appears to be a legitimate application, utility, game, or screensaver that performs malicious activities surreptitiously is a Trojan horse.

A program that has no useful purpose but attempts to spread itself to other systems and often damages resources on the systems where it is found is a virus.

What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event trigger it?

It may also be inserted into other forms of malware such as viruses, worms or Trojan horses. A logic bomb is sneaky because its code lies dormant until the trigger occurs.

What is a program that appears to be a legitimate application utility game or screensaver but performs malicious activities surreptitiously?

EXPLANATION A Trojan horse is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously.

What term refers to a piece of code that sits dormant for a period of time until some event invokes its malicious payload?

Malware. What term refers to a piece of code that sits dormant for a period of time until some event invokes its malicious payload? Trojan.

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software such as a virus?

A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.