Multiple Choice
The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called
A) masquerading.
B) bluebugging.
C) eavesdropping.
D) podslurping.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q9: Developers of computer systems often include a
Q10: _ consists of the unauthorized copying of
Q11: Ashley Baker has been the webmaster for
Q12: On the weekends,Mary Andersen climbs into her
Q13: Spyware is<br>A)software that tells the user if
Q15: Which of the following websites likely poses
Q16: Offering a free website,then charging the phone
Q17: Individuals who use telephone lines to commit
Q18: During a routine audit,a review of cash
Q19: A fraud technique that uses unauthorized codes