Which access control attack is also referred to as masquerading?
A. emanating
B. sniffing
C. malicious software
D. spoofing
D Spoofing is also referred to as masquerading.
Computer Science & Information Technology
You might also like to view...
For fields containing social security numbers or dates, a(n) ________ can automatically provide characters such as hyphens or slashes
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following is NOT a choice on the Shape Effects list?
A) Reflection B) Shine C) Bevel D) Soft Edges
Computer Science & Information Technology