Ask Question

Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using a. a Trojan horse. b. the salami technique. c. superzapping. d. a trap door.

+5
Answers (1)
  1. 16 May, 03:42
    0
    a trap door.

    Explanation:

    A trap door or back door is an undocumented or fraudulent way of gaining access to a system that is built into the system by its designer during the development process thereby allowing access into the system that bypasses normal system controls.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers