Multiple Choice
Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a
A) Trojan horse.
B) key logger.
C) spoof.
D) back door.
Correct Answer:

Verified
Correct Answer:
Verified
Q4: Listening to private voice or data transmissions
Q5: Jim Cooper decided to do some Christmas
Q6: After graduating from college,Rob Johnson experienced some
Q7: Executable code that attaches itself to software,replicates
Q8: Zeus is an example of a<br>A)virus.<br>B)worm.<br>C)Trojan horse.<br>D)war
Q10: _ consists of the unauthorized copying of
Q11: Ashley Baker has been the webmaster for
Q12: On the weekends,Mary Andersen climbs into her
Q13: Spyware is<br>A)software that tells the user if
Q14: The deceptive method by which a perpetrator