Author Question: An example of __________ is an attempt by an unauthorized user to gain access to a system by posing ... (Read 138 times)

ghost!

  • Hero Member
  • *****
  • Posts: 560
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
 
  A. masquerade C. interception
   B. repudiation D. inference

Question 2

The _________ prevents or inhibits the normal use or management of communications facilities.
 
  A. passive attack C. traffic encryption
   B. denial of service D. masquerade



Eunice618

  • Sr. Member
  • ****
  • Posts: 350
Answer to Question 1

A

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Common abbreviations that cause medication errors include U (unit), mg (milligram), QD (every day), SC (subcutaneous), TIW (three times per week), D/C (discharge or discontinue), HS (at bedtime or "hours of sleep"), cc (cubic centimeters), and AU (each ear).

Did you know?

Thyroid conditions cause a higher risk of fibromyalgia and chronic fatigue syndrome.

Did you know?

Though the United States has largely rejected the metric system, it is used for currency, as in 100 pennies = 1 dollar. Previously, the British currency system was used, with measurements such as 12 pence to the shilling, and 20 shillings to the pound.

Did you know?

Blood is approximately twice as thick as water because of the cells and other components found in it.

Did you know?

The top 10 most important tips that will help you grow old gracefully include (1) quit smoking, (2) keep your weight down, (3) take supplements, (4) skip a meal each day or fast 1 day per week, (5) get a pet, (6) get medical help for chronic pain, (7) walk regularly, (8) reduce arguments, (9) put live plants in your living space, and (10) do some weight training.

For a complete list of videos, visit our video library