Question: 2 2 . 2 % complete Question Which of the following is NOT a method that a malicious person can use to masquerade as someone
complete
Question
Which of the following is NOT a method that a malicious person can use to masquerade as someone else when using email or Instant Messaging?
AOverwhelm the server with a Denial of Service DoS
BStealing a user's login information
CUsing an unattended computer that is still logged in
DUsing malware such as a Trojan
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
