The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Correct Answer:
Verified
Q2: Tapping into a communications line and then
Q5: A fraud technique that slices off tiny
Q7: What is a denial of service attack?
A)
Q9: Computers that are part of a botnet
Q14: Gaining control of someone else's computer to
Q17: The unauthorized access to,and use of,computer systems
Q19: When a computer criminal gains access to
Q21: Wally Hewitt is an accountant with a
Q23: Telefarm Industries is a telemarketing firm that
Q49: Which method of fraud is physical in
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents