What term best describes an attack that relies on stolen or falsified authentication credentials to bypass an authentication mechanism?
A. Spoofing
B. Replay
C. Masquerading
D. Modification
Answer: C. Masquerading
Computer Science & Information Technology
You might also like to view...
The __________ causes the content of another file to be inserted into a program.
a. cout object b. double slash (//) c. #include directive d. semicolon (;) e. None of these
Computer Science & Information Technology
In order to create a ____ capability, the governance process also has to ensure that information security management and the various players in long-range corporate planning are formally linked.
A. strategic management B. strategic governance C. strategic control D. strategic reporting
Computer Science & Information Technology