A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a:
A) salami slice.
B) logic bomb.
C) super-zapper.
D) Trojan horse.
Correct Answer:
Verified
Q10: The biggest difference between traditional evidence and
Q11: A virus attack may replace or destroy
Q12: Skimming is defined as:
A)monitoring data traveling along
Q13: A secretly attached program that monitors a
Q14: NW3C stands for:
A)North West Computer Crime Center.
B)National
Q16: IC3 stands for:
A)International Computer Crime Categorization.
B)International Computer
Q17: Theft of intellectual property:
A)involves the theft of
Q18: A zombie is a computer:
A)used to spoof
Q19: Which of the following statements is true?
A)A
Q20: Intentionally destroying computer information, programs, or hardware
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents