Author Question: An example of __________ is an attempt by an unauthorized user to gain access to a system by posing ... (Read 131 times)

ghost!

  • Hero Member
  • *****
  • Posts: 560
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
 
  A. masquerade C. interception
   B. repudiation D. inference

Question 2

The _________ prevents or inhibits the normal use or management of communications facilities.
 
  A. passive attack C. traffic encryption
   B. denial of service D. masquerade



Eunice618

  • Sr. Member
  • ****
  • Posts: 350
Answer to Question 1

A

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Though methadone is often used to treat dependency on other opioids, the drug itself can be abused. Crushing or snorting methadone can achieve the opiate "rush" desired by addicts. Improper use such as these can lead to a dangerous dependency on methadone. This drug now accounts for nearly one-third of opioid-related deaths.

Did you know?

Every 10 seconds, a person in the United States goes to the emergency room complaining of head pain. About 1.2 million visits are for acute migraine attacks.

Did you know?

Interferon was scarce and expensive until 1980, when the interferon gene was inserted into bacteria using recombinant DNA technology, allowing for mass cultivation and purification from bacterial cultures.

Did you know?

Blood is approximately twice as thick as water because of the cells and other components found in it.

Did you know?

Asthma cases in Americans are about 75% higher today than they were in 1980.

For a complete list of videos, visit our video library