Which one of the following malicious code objects might be inserted in an application by?
Which one of the following malicious code objects might be inserted in an application by? The correct answer is Logic bomb. Logic bombs are malicious code objects programmed to lie dormant until certain logical conditions, such as a certain date, time, system event, or other criteria, are met. At that time, they spring into action, triggering their payload.