Multiple Choice
Some unauthorized programs are able to __________the legitimate system and substitute their own processing.
A) overwhelm
B) hack
C) usurp
D) deny
E) complement
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q18: By starting a computationally intense application at
Q20: Hardened Web sites use special versions of
Q21: _is a technique for intercepting computer communications.<br>A)
Q22: One of the most important security tasks
Q24: The _publishes a handbook that suggests what
Q25: Because SSL lies between levels 4 and
Q27: Australia has _ individual privacy laws than
Q28: Which of the following is a threat
Q36: Spoofing is a technique for intercepting computer
Q73: Technical safeguards involve the hardware and software