Multiple Choice
The unauthorized use of special program that bypass regular system controls to perform illegal acts is called
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q37: Computer fraud perpetrators that modify programs during
Q38: Ashley Baker has been the webmaster for
Q39: Describe the differences between spyware,scareware,and ransomware.
Q40: Changing data before or during entry into
Q41: Describe the various form of spoofing.Select one
Q43: Spyware that pops banner ads on a
Q44: A fraud technique that uses a back
Q45: Redirecting traffic to a spoofed website to
Q46: Secretly changing an already open browser tab
Q47: It was late on a Friday afternoon