Computer fraud perpetrators have developed many methods to commit their acts.One way is to modify programs during systems development allowing access into the system that bypasses normal system controls.This is known as
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Correct Answer:
Verified
Q2: Tapping into a communications line and then
Q2: Which of the following is not a
Q5: A fraud technique that slices off tiny
Q18: The unauthorized use of special system programs
Q19: When a computer criminal gains access to
Q40: The unauthorized copying of company data is
Q42: Illegally obtaining and using confidential information about
Q46: Which type of antivirus program is most
Q50: How can an organization reduce fraud losses?
A)encrypt
Q76: A _ is similar to a _,except
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents