An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

A. masquerade B. interception

C. repudiation D. inference


A. masquerade

Computer Science & Information Technology

You might also like to view...

MC Bytes are composed of__________ bits.

a) Ten. b) Six. c) Eight. d) Two.

Computer Science & Information Technology

A format string has the form:

a) {X[:FormatString][,Y]} b) {X[,Y][:FormatString]} c) {[FormatString:]X[,Y]} d) None of the above

Computer Science & Information Technology

What must happen to allow private members of a class to be inherited by a derived class?

What will be an ideal response?

Computer Science & Information Technology

What term is used to describe a globally distributed network of proxy servers deployed in multiple data centers?

A. domain network B. content delivery network C. global proxy network D. demilitarized zone

Computer Science & Information Technology