An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
A. masquerade B. interception
C. repudiation D. inference
A. masquerade
Computer Science & Information Technology
You might also like to view...
If the default conditional format options do not provide what you need, you can create your own rule for formatting
Indicate whether the statement is true or false
Computer Science & Information Technology
The acronym TCP/IP stands for Transmission Controller Protocol/Intercommunication Protocol. True or False?
Indicate whether the statement is true or false
Computer Science & Information Technology