Multiple Choice
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorised ones.
A) Encryption
B) Sniffing
C) Usurpation
D) Spoofing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q6: What are the three interdependent factors involved
Q8: Adware and spyware are similar to each
Q9: Which of the following uses an individual's
Q10: Explain the two critical security functions that
Q12: _ are small files that browsers store
Q13: With HTTPS,data are encrypted using a protocol
Q14: Breaking into computers,servers,or networks to steal proprietary
Q15: Activity log analyses constitute an important _
Q18: The existence of accounts that are no
Q57: List some important malware safeguards.