Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using a. a Trojan horse. b. the salami technique. c. superzapping. d. a trap door.

Respuesta :

Debel

Answer:

a trap door.

Explanation:

A trap door or back door is an undocumented or fraudulent way of gaining access to a system that is built into the system by its designer during the development process thereby allowing access into the system that bypasses normal system controls.