A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files.
A) salami slicing
B) back door
C) logic bomb
D) Trojan horse
Correct Answer:
Verified
Q59: Events that could have a positive impact
Q60: Risk assessment is best described by:
A) Internal
Q61: _ sets the tone of the organization,
Q62: _ is a process that evaluates the
Q63: This framework was issued in 1996 (and
Q65: According to the 2012 Report to the
Q66: The section of Sarbanes Oxley that makes
Q67: _ are the policies and procedures that
Q68: The information process control goal which relates
Q69: As a result of an inadequate design,
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents