Multiple Choice
A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files.
A) salami slicing
B) back door
C) logic bomb
D) Trojan horse
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q57: The section of Sarbanes Oxley that makes
Q58: The control goal called ensure _ is
Q59: _ relate to a specific AIS process,
Q60: A computer abuse technique called a _
Q61: The control goal called efficiency of operations
Q63: With the issuance of the SEC Interpretative
Q64: SAS No. 99 emphasizes auditors should brainstorm
Q65: A(n) _ control plan is designed to
Q66: The ERM framework addresses four categories of
Q67: A fraud is a deliberate act or