Author Question: An example of __________ is an attempt by an unauthorized user to gain access to a system by posing ... (Read 82 times)

ghost!

  • Hero Member
  • *****
  • Posts: 560
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
 
  A. masquerade C. interception
   B. repudiation D. inference

Question 2

The _________ prevents or inhibits the normal use or management of communications facilities.
 
  A. passive attack C. traffic encryption
   B. denial of service D. masquerade



Eunice618

  • Sr. Member
  • ****
  • Posts: 350
Answer to Question 1

A

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The Romans did not use numerals to indicate fractions but instead used words to indicate parts of a whole.

Did you know?

More than 30% of American adults, and about 12% of children utilize health care approaches that were developed outside of conventional medicine.

Did you know?

To prove that stomach ulcers were caused by bacteria and not by stress, a researcher consumed an entire laboratory beaker full of bacterial culture. After this, he did indeed develop stomach ulcers, and won the Nobel Prize for his discovery.

Did you know?

In ancient Rome, many of the richer people in the population had lead-induced gout. The reason for this is unclear. Lead poisoning has also been linked to madness.

Did you know?

Essential fatty acids have been shown to be effective against ulcers, asthma, dental cavities, and skin disorders such as acne.

For a complete list of videos, visit our video library