Hardcoded credentials in the source code which are checked prior to the normal authentication process is an example of which of the following
A backdoor
An access control vulnerability
A buffer over flow
A SQL injection vulnerability