In the last few days, users have reported to you that they have each received two emails from an unknown source with file attachments. Fortunately the users have listened to your training and no one has run the attached program. You study the attachment on an isolated computer and find that it is a program that is designed to execute a payload when the system clock registers 10:10 PM on February 29. Which of the following best identifies the type of program is the attachment?
Tequila
4 months agoDonte
4 months agoSunny
4 months agoSharee
4 months agoTelma
2 months agoRenea
3 months agoTwana
3 months agoDenae
4 months agoTiffiny
4 months agoJohanna
3 months agoJolene
3 months agoBurma
3 months agoZona
4 months agoKenny
4 months agoNu
3 months agoCarylon
3 months agoHoney
3 months agoKarl
4 months ago