Which access control attack is also referred to as masquerading?

A. emanating
B. sniffing
C. malicious software
D. spoofing

D Spoofing is also referred to as masquerading.

Computer Science & Information Technology

You might also like to view...

For fields containing social security numbers or dates, a(n) ________ can automatically provide characters such as hyphens or slashes

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is NOT a choice on the Shape Effects list?

A) Reflection B) Shine C) Bevel D) Soft Edges

Computer Science & Information Technology