This computer crime involves the secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions. It is unique in that it usually also allows the victim computer to perform most or all of the functions for its originally intended purposes. The intent of this crime is often used for inserting instructions for logic bombs,

salami attacks, and viruses.
What is this crime?

A) Hacking
B) Scanning
C) Data diddling
D) Trojan horse


Answer: D

Criminal Justice

You might also like to view...

A________model views programs as an interrelated process of inputs, programs, and outputs

Fill in the blank(s) with correct word

Criminal Justice

Which Dangerous assessment tool identifies risk factors that can be very serious to offenders?

A. YLS/CMI B. SAVRY C. PCL:YV D. MMPI E. MACI

Criminal Justice

A police officer is using an informant to purchase drugs at a popular bar known for drug activity. The officer tells the informant, "I don't care what you have to do, just buy drugs from anyone inside and you'll get your money!" What legal question may

arise following an arrest during this operation? A) Fourth Amendment issues disallowing the evidence B) First Amendment issues by infringing on protected free speech in public areas C) Entrapment issues based on the instructions given to the informant D) Duress of the informant

Criminal Justice

Which of the following is NOT one of the eight main types of activities that contribute to the security and custody functions within a prison?

A) effective inmate classification system B) control of contraband items C) implementation of an effective inmate disciplinary system D) reduction of muscle-building exercise, particularly weightlifting

Criminal Justice