Q.

It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

A. security exploit
B. vulnerability scanner
C. packet sniffer
D. rootkit
Answer» A. security exploit
587
0
Do you find this helpful?
10

View all MCQs in

Computer Security

Discussion

No comments yet