Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Correct Answer:
Verified
Q70: On a Friday evening you use a
Q71: Changing data before or during entry into
Q72: Identify theft has always been a federal
Q73: Which of the following is not an
Q74: Pretexting is best described as a social
Q76: A _ is similar to a _,except
Q77: A fraud technique that allows a perpetrator
Q78: Someone knocked on your door on a
Q79: Which of the following websites likely poses
Q80: Describe ways to help minimize social engineering.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents