what John has done?

John covertly learns the user ID and password of a higher-ranked technician and uses the credentials to access certain areas of a network. What term describes what John has done?

John covertly learns the user ID and password of a higher-ranked technician and uses the credentials to access certain areas of a network. What term describes what John has done?

A.
IP spoofing

B.
Backdooring

C.
Masquerading

D.
Data diddling

Explanation:
Masquerading is a term that describes a person who pretends to be an authorized user
to circumvent established controls.



Leave a Reply 0

Your email address will not be published. Required fields are marked *