CORRECT TEXT ________ attacks generally prevent valid authorized users from gaining access to system resources.
If a sender is unable to deny having sent an electronic transmission, this concept is known as___________________