Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 16
Quiz 5: Computer Fraud and Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
A __________ is similar to a __________,except that it is a program rather than a code segment hidden in a host program.
Question 42
Multiple Choice
Illegally obtaining and using confidential information about a person for economic gain
Question 43
Multiple Choice
When a computer criminal gains access to a system by searching records or the trash of the target company,this is referred to as
Question 44
Multiple Choice
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
Question 45
Multiple Choice
Computer fraud perpetrators have developed many methods to commit their acts.One way is to modify programs during systems development allowing access into the system that bypasses normal system controls.This is known as