What term best describes an attack that relies on stolen or falsified authentication credentials to bypass an authentication mechanism?

A. Spoofing
B. Replay
C. Masquerading
D. Modification


Answer: C. Masquerading

Computer Science & Information Technology

You might also like to view...

_____ provides a way to transfer files from one computer to another over a network.

A. TCP B. FTP C. IPv6 D. IP

Computer Science & Information Technology

When two documents are merged, Word replaces each merge ________ with data from the data source

Fill in the blank(s) with correct word

Computer Science & Information Technology

Using Filter by Form allows you to filter on ________ criteria

Fill in the blank(s) with correct word

Computer Science & Information Technology

The header field that can contain a security field, which enables the sender to assign a classification level to the packet is ____.

A. flags B. options C. protocol D. destination IP address

Computer Science & Information Technology