Multiple Choice
When a person, using a computer system, pretends to be someone else, it is termed:
A) DoS Attack
B) Hacking
C) Spoofing
D) Phishing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q61: A set of documented guidelines for moral
Q62: If an organization's IT systems are not
Q63: When a customer improperly obtains cash or
Q64: Jamie Stark, a sales employee, stole merchandise
Q65: A process, effected by an entity's board
Q67: Which of the following is not an
Q68: When a person alters a system generated
Q69: The COSO report is also known as:<br>A)Fraud
Q70: The existence of verifiable information about the
Q71: Which control activity is intended to serve