An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
A. masquerade B. interception
C. repudiation D. inference
A. masquerade
Computer Science & Information Technology
You might also like to view...
MC Bytes are composed of__________ bits.
a) Ten. b) Six. c) Eight. d) Two.
Computer Science & Information Technology
A format string has the form:
a) {X[:FormatString][,Y]} b) {X[,Y][:FormatString]} c) {[FormatString:]X[,Y]} d) None of the above
Computer Science & Information Technology
What must happen to allow private members of a class to be inherited by a derived class?
What will be an ideal response?
Computer Science & Information Technology
What term is used to describe a globally distributed network of proxy servers deployed in multiple data centers?
A. domain network B. content delivery network C. global proxy network D. demilitarized zone
Computer Science & Information Technology