Multiple Choice
The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q6: Computer fraud perpetrators who use telephone lines
Q9: The unauthorized access to,and use of,computer systems
Q10: The call to tech support was fairly
Q12: Wally Hewitt is an accountant with a
Q13: Which of the following is not a
Q51: In the 1960s,techniques were developed that allowed
Q66: Illegally obtaining and using confidential information about
Q70: In November of 2005 it was discovered
Q78: Describe the differences between a worm and
Q85: A set of unauthorized computer instructions in