What are attempts to gain access to a switch system by posing as an authorized user?
a. Toll fraud.
b. War dialing.
c. Masquerades.
d. Denial of service.
Ans: c. Masquerades.
Computer Science & Information Technology
a. Toll fraud.
b. War dialing.
c. Masquerades.
d. Denial of service.
Ans: c. Masquerades.