Multiple Choice
A fraud technique that uses unauthorized codes in an authorized and properly functioning program is called the ________ technique.
A) Trojan horse
B) man-in-the-middle
C) salami
D) trap door
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q14: The deceptive method by which a perpetrator
Q15: Which of the following websites likely poses
Q16: Offering a free website,then charging the phone
Q17: Individuals who use telephone lines to commit
Q18: During a routine audit,a review of cash
Q20: Using computer technology to harm another person
Q21: Lebanese looping is<br>A)verifying credit card validity;buying and
Q22: A back door into a system that
Q23: LOLer was chatting online with l33ter."I can't
Q24: Voice phishing,in which e-mail recipients are asked