1. National Institute of Standards and Technology (NIST) Special Publication 800-83 Rev. 1
Guide to Malware Incident Prevention and Handling for Desktops and Laptops. Section 2.3.1.4 states
"Logic bombs are a type of malicious code that is intentionally installed
often by an insider. A logic bomb remains dormant until a specific condition is met... A common type of logic bomb is a time bomb
which is set to activate on a particular date and time." This reference distinguishes a logic bomb (the scenario) from a time bomb (the closest option) and shows they are related concepts.
2. Stallings
W.
& Brown
L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. In Chapter 6
"Malicious Software
" a backdoor is defined as "a secret entry point into a program that allows someone that is aware of the backdoor to gain access without going through the usual security access procedures." This clearly differentiates it from the destructive payload in the question.
3. National Institute of Standards and Technology (NIST) Special Publication 800-12 Rev. 1
An Introduction to Information Security. In Appendix D
"Glossary
" a logic bomb is defined as "A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met." This confirms the scenario describes a logic bomb.