An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user

A. masquerade C. interception
B. repudiation D. inference


A

Business

You might also like to view...

Customer relationship management software has experienced __________ adoption in recent years.

a. decreased b. increased c. neither an increase nor decrease in adoption d. customer relationship management software adoption cannot be measured

Business

In describing a client/server system, the software needed to support the interactions between the clients and the server is called:

A) clientware. B) middleware. C) expert system. D) telecommunications interface software.

Business

Richard exchanges a building with a basis of $35,000, and subject to a liability of $25,000, for land with a FMV of $50,000 owned by Bill. Bill takes the building subject to the liability. What is the amount of Richard's realized gain?

A) $0 B) $15,000 C) $25,000 D) $40,000

Business

Individual information systems for each functional area in a company are known as silos

Indicate whether the statement is true or false

Business