The unauthorized use of special program that bypass regular system controls to perform illegal acts is called
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Correct Answer:
Verified
Q60: Describe at least six computer attacks and
Q61: Which of the following is not a
Q62: What is social engineering? Provide an example.
Q63: Spyware is
A)software that tells the user if
Q64: A part of a program that remains
Q66: Executable code that attaches itself to software,replicates
Q67: A back door into a system that
Q68: A set of unauthorized computer instructions in
Q69: Describe at least four social engineering techniques.Provide
Q70: On a Friday evening you use a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents