________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications.

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications.
A) Encryption
B) Spoofing
C) Phishing
D) Usurpation
E) Spear Phishing
Answer :

Leave a Comment