An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

A. masquerade B. interception

C. repudiation D. inference

A. masquerade

Computer Science & Information Technology

You might also like to view...

If the default conditional format options do not provide what you need, you can create your own rule for formatting

Indicate whether the statement is true or false

Computer Science & Information Technology

The acronym TCP/IP stands for Transmission Controller Protocol/Intercommunication Protocol. True or False?

Indicate whether the statement is true or false

Computer Science & Information Technology