What are attempts to gain access to a switch system by posing as an authorized user?

a. Toll fraud.
b. War dialing.
c. Masquerades.
d. Denial of service.

Ans: c. Masquerades.

Computer Science & Information Technology

You might also like to view...

The AutoNumber data type is best used for the primary key

Indicate whether the statement is true or false

Computer Science & Information Technology

The number of root CAs in a three-tier hierarchy is ______

a. One b. Two c. Three d. Four

Computer Science & Information Technology