Multiple Choice
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
A) masquerade
B) interception
C) repudiation
D) inference
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q25: A(n) _ is a threat that is
Q27: A threat action in which sensitive data
Q28: Replay, masquerade, modification of messages, and denial
Q29: Confidentiality, Integrity, and Availability form what is
Q31: The "A" in the CIA triad stands
Q32: A loss of _ is the disruption
Q32: A(n) _ is any means taken to
Q33: The first step in devising security services
Q35: Security mechanisms typically do not involve more
Q43: The more critical a component or service,