In which scenario is a logic bomb an example of a security threat?

Disable ads (and more) with a membership for a one time $4.99 payment

Prepare for the MTA Security Exam with flashcards and multiple choice questions. Each question includes hints and explanations. Get ready for your certification test!

A logic bomb is defined as malicious code that is intentionally inserted into a software system and is designed to execute when specific conditions are met. This means that the threat lies in the fact that the code remains dormant until a predetermined trigger occurs, such as a specific date, the opening of a certain file, or certain user actions. Therefore, when we consider the characteristics of a logic bomb, the scenario where code is triggered by specific conditions perfectly encapsulates how logic bombs operate, showcasing them as a clear example of a security threat.

The other scenarios presented do not align with the specific mechanics of how logic bombs function. Unauthorized access pertains to breaches of security that may involve hacking or password compromises, which is not the unique behavior of a logic bomb. Incorrectly backing up data relates to data integrity and availability issues rather than malicious code execution. Lastly, locking a user out of an account is generally a security measure or a consequence of failed authentication attempts, not a deliberate activation of harmful code. Thus, the distinct nature of a logic bomb being condition-based makes the first scenario the most appropriate representation of this type of security threat.