In the last few days, users have reported to you that they have each received two emails from an unknown source with file attachments. Fortunately the users have listened to your training and no one has run the attached program. You study the attachment on an isolated computer and find that it is a program that is designed to execute a payload when the system clock registers 10:10 PM on February 29. Which of the following best identifies the type of program is the attachment?
Tequila
9 months agoDonte
9 months agoSunny
10 months agoSharee
10 months agoTelma
8 months agoRenea
9 months agoTwana
9 months agoDenae
10 months agoTiffiny
10 months agoJohanna
9 months agoJolene
9 months agoBurma
9 months agoZona
9 months agoKenny
10 months agoNu
9 months agoCarylon
9 months agoHoney
9 months agoKarl
10 months ago