A __________ takes place when one entity pretends to be a different entity.

A) replay
B) masquerade
C) service denial
D) passive attack


B) masquerade

Computer Science & Information Technology

You might also like to view...

Classes which may be instantiated are ___________ classes.

a) instance b) concrete c) abstract d) None of the above

Computer Science & Information Technology

A function that groups and performs calculations on multiple fields

a. Sort function b. Aggregate function c. Control function

Computer Science & Information Technology

Diligent Dan needs to configure a VPN on his laptop so that he can work 20 more hours a week from home. Which IE tab should Dan use to configure the VPN connection?

A) Connections B) Programs C) Privacy D) Content E) Security

Computer Science & Information Technology

_______ applications embrace threading in a fundamental way.

A. Multi-instance B. Multi-process C. Java D. Threaded

Computer Science & Information Technology