Solved

When Criminals Replace a Legitimate User or Software Program with Their

Question 27

Multiple Choice

When criminals replace a legitimate user or software program with their own access or illegitimate software program to give the attacker unauthorized control of some part of the IS,it is known as:


A) usurpation
B) an overflow attack
C) SQL injection attack
D) malware

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions