An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user
A. masquerade C. interception
B. repudiation D. inference
A
You might also like to view...
Customer relationship management software has experienced __________ adoption in recent years.
a. decreased b. increased c. neither an increase nor decrease in adoption d. customer relationship management software adoption cannot be measured
In describing a client/server system, the software needed to support the interactions between the clients and the server is called:
A) clientware. B) middleware. C) expert system. D) telecommunications interface software.
Richard exchanges a building with a basis of $35,000, and subject to a liability of $25,000, for land with a FMV of $50,000 owned by Bill. Bill takes the building subject to the liability. What is the amount of Richard's realized gain?
A) $0 B) $15,000 C) $25,000 D) $40,000
Individual information systems for each functional area in a company are known as silos
Indicate whether the statement is true or false