Multiple Choice
The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called
A) cracking.
B) masquerading.
C) hacking.
D) superzapping.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q18: During a routine audit,a review of cash
Q29: Steganography malware uses encryption to increase its
Q50: After graduating from college with a communications
Q52: Computers that are part of a botnet
Q54: What is a denial of service attack?<br>A)
Q57: Law enforcement uses key logging software,a form
Q59: How can a system be protected from
Q85: A set of unauthorized computer instructions in
Q88: Recall that students used Facebook and VKontakte
Q95: Jerry Schneider was able to amass operating