Multiple Choice
One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is the intent to illegally obtain information or tangible property through the use of computers.Which of the following methods might accomplish this type of crime if the perpetrator can change data before, during, or after they are entered into a computer system?
A) Salami technique
B) Data diddling
C) Shoulder surfing
D) Trojan horse program
Correct Answer:

Verified
Correct Answer:
Verified
Q62: _ protects data in transit and at
Q63: The U.S.Congress passed the first federal computer
Q64: In thwarting cybercrime, which of the following
Q65: According to the most recent ACFE Report
Q66: A DDOS is a collection of compromise
Q68: The absence of good statistics on cybercrime
Q69: A computer virus may lie dormant in
Q70: A computer virus is:<br>A)A disease that computer
Q71: Which of these would be an example
Q72: Organizations that stress the importance of business