A __________ takes place when one entity pretends to be a different entity.
A) replay
B) masquerade
C) service denial
D) passive attack
B) masquerade
Computer Science & Information Technology
You might also like to view...
Classes which may be instantiated are ___________ classes.
a) instance b) concrete c) abstract d) None of the above
Computer Science & Information Technology
A function that groups and performs calculations on multiple fields
a. Sort function b. Aggregate function c. Control function
Computer Science & Information Technology
Diligent Dan needs to configure a VPN on his laptop so that he can work 20 more hours a week from home. Which IE tab should Dan use to configure the VPN connection?
A) Connections B) Programs C) Privacy D) Content E) Security
Computer Science & Information Technology
_______ applications embrace threading in a fundamental way.
A. Multi-instance B. Multi-process C. Java D. Threaded
Computer Science & Information Technology