An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
A) masquerade
B) repudiation
C) interception
D) inference
Correct Answer:
Verified
Q20: A flaw or weakness in a system's
Q21: A loss of _ is the disruption
Q24: A _ is any action that compromises
Q25: In the United States, student grade information
Q27: _ is the protection afforded to an
Q28: _ is the insertion of bits into
Q29: A(n)_ is an attempt to learn or
Q32: Misappropriation and misuse are attacks that result
Q35: The assets of a computer system can
Q39: A(n) _ is a threat that is
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents