Question: 2 2 . 2 % complete Question Which of the following is NOT a method that a malicious person can use to masquerade as someone

22.2% complete
Question
Which of the following is NOT a method that a malicious person can use to masquerade as someone else when using email or Instant Messaging?
A.Overwhelm the server with a Denial of Service (DoS)
B.Stealing a user's login information
C.Using an unattended computer that is still logged in
D.Using malware such as a Trojan

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!