And the answer is...
Code inserted into malware that lies dormant until a predefined condition is met, at which time it triggers unauthorized behavior
Form your question now...
Were you right?
Correct Question.