2) Which of the following is the correct description of a logic bomb?

A) A logic bomb physically destroys the hardware in computer networks
B) A logic bomb attacks a useful and authorized program on a user's computer
C) A logic bomb allows cyber terrorist to covertly use computers belonging to other users in cyber attacks
D) A logic bomb destroys all of the data on a disk by reformatting the hard drive or randomly inserting "garbage" into files, making them inaccessible

3) The difference between a cyber criminal and a cyber terrorist is that

A) Criminals view hacking into and attacking a computer system as a challenge to meet rather than use these skills to disrupt infrastructure that affects the economic growth of the world
B) Terrorist do not use the same techniques and tools to hack into computer networks as criminals
C) Criminals are motivated to destroy financial and other infrastructure data, whereas terrorist only seek to manipulate these data
D) Criminals are focused on specific types of technology hardware and software infiltration, whereas terrorist seek to disrupt all forms of technology