Multiple Choice
Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q32: Someone knocked on your door on a
Q33: When a computer criminal gains access to
Q34: Sending an unsolicited message to many people
Q35: Tapping into a communications line and then
Q36: What is a buffer overflow attack?<br>A)It is
Q38: Ashley Baker has been the webmaster for
Q39: Describe the differences between spyware,scareware,and ransomware.
Q40: Changing data before or during entry into
Q41: Describe the various form of spoofing.Select one
Q42: The unauthorized use of special program that