And the answer is...

Code inserted into malware that lies dormant until a predefined condition is met, at which time it triggers unauthorized behavior

Form your question now...


Were you right?

Correct Question.