Home / Report Question

Q. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
  • A. security exploit
  • B. vulnerability scanner
  • C. packet sniffer
  • D. rootkit

Correct Answer: A