Ask Question
10 September, 06:31

Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using a. a Trojan horse. b. the salami technique. c. superzapping. d. a trap door.

+4
Answers (1)
  1. 10 September, 07:04
    0
    a trap door.

    Explanation:

    A trap door or back door is an undocumented or fraudulent way of gaining access to a system that is built into the system by its designer during the development process thereby allowing access into the system that bypasses normal system controls.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers