Multiple Choice
A fraud technique that uses a back door into a system that bypasses normal system controls is called the ________ technique.
A) Trojan horse
B) man-in-the-middle
C) salami
D) trap door
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q39: Describe the differences between spyware,scareware,and ransomware.
Q40: Changing data before or during entry into
Q41: Describe the various form of spoofing.Select one
Q42: The unauthorized use of special program that
Q43: Spyware that pops banner ads on a
Q45: Redirecting traffic to a spoofed website to
Q46: Secretly changing an already open browser tab
Q47: It was late on a Friday afternoon
Q48: Megan has purchased a brand new laptop
Q49: Which of the following is not a