Question: QUESTION 4 An example of O masquerade O interception O repudiation O inference is an attempt by an unauthorized user to gain access to a

QUESTION 4 An example of O masquerade O interception O repudiation O inference is an attempt by an unauthorized user to gain access to a system by posing as an authorized user. QUESTION 5 Theprevents or inhibits the normal use or management of communications facilities. O passive attack Otraffic encryption O denial of service O masquerade QUESTION 6 A is any action that compromises the security of information owned by an organization. O security mechanism Osecurity attack O security policy O security service
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
