Multiple Choice
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
A) masquerade
B) repudiation
C) interception
D) inference
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: Misappropriation and misuse are attacks that result
Q16: A flaw or weakness in a system's
Q17: _ assures that a system performs its
Q24: A _ is any action that compromises
Q29: Confidentiality, Integrity, and Availability form what is
Q32: A(n) _ is any means taken to
Q32: A loss of _ is the disruption
Q37: _ is the protection afforded to an
Q37: In the United States, student grade information
Q41: Contingency planning is a functional area that