Multiple Choice
Some unauthorized programs are able to ________ legitimate systems and substitute their own processing.
A) usurp
B) spoof
C) hack
D) flood
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q14: _ is the process of transforming clear
Q58: How can data safeguards protect against security
Q62: Incorrectly increasing a customer's discount is an
Q63: _ simply take computers with wireless connections
Q64: Which of the following is a synonym
Q64: What should an organization do when a
Q65: A(n)_ is a computer program that senses
Q71: Explain denial of service (DOS)in information management.
Q72: In a brute force attack,the password cracker
Q91: Perimeter firewalls are the simplest type of