QUESTION 4 An example of O masquerade O interception O repudiation O inference i
ID: 3699711 • Letter: Q
Question
QUESTION 4 An example of O masquerade O interception O repudiation O inference is an attempt by an unauthorized user to gain access to a system by posing as an authorized user. QUESTION 5 Theprevents or inhibits the normal use or management of communications facilities. O passive attack Otraffic encryption O denial of service O masquerade QUESTION 6 A is any action that compromises the security of information owned by an organization. O security mechanism Osecurity attack O security policy O security serviceExplanation / Answer
ANSWER 4: HEre option(A) will be correct because a masquerade is a disguise. In terms of communications security issues, a masquerade is a type of attack where the attacker pretends to be an authorized user of a system in order to gain access to it or to gain greater privileges than they are authorized for.
ANSWER 5: Here option(B) will be correct.
ANSWER 6: HEre option(B) will be correct because in this attack security of information compromises easily.
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.