What term best describes an attack that relies on stolen or falsified authentication credentials to bypass an authentication mechanism?
A. Spoofing
B. Replay
C. Masquerading
D. Modification
Answer: C. Masquerading
Computer Science & Information Technology
You might also like to view...
_____ provides a way to transfer files from one computer to another over a network.
A. TCP B. FTP C. IPv6 D. IP
Computer Science & Information Technology
When two documents are merged, Word replaces each merge ________ with data from the data source
Fill in the blank(s) with correct word
Computer Science & Information Technology
Using Filter by Form allows you to filter on ________ criteria
Fill in the blank(s) with correct word
Computer Science & Information Technology
The header field that can contain a security field, which enables the sender to assign a classification level to the packet is ____.
A. flags B. options C. protocol D. destination IP address
Computer Science & Information Technology