What term best describes an attack that relies on stolen or falsified authentication credentials to bypass an authentication mechanism?

A. Spoofing
B. Replay
C. Masquerading
D. Modification

Answer: C. Masquerading

Computer Science & Information Technology

You might also like to view...

The __________ causes the content of another file to be inserted into a program.

a. cout object b. double slash (//) c. #include directive d. semicolon (;) e. None of these

Computer Science & Information Technology

In order to create a ____ capability, the governance process also has to ensure that information security management and the various players in long-range corporate planning are formally linked.

A. strategic management B. strategic governance C. strategic control D. strategic reporting

Computer Science & Information Technology