Which component of the IT Security Model is attacked with masquerade?
Which component of the IT Security Model is attacked with masquerade?
A . Integrity
B . Availability
C . Confidentiality
D . Authentication
Answer: D
Explanation:
A masquerade attack involves an attacker pretending to be an authorized user of a system, thus compromising the authentication component of the IT security model. Authentication ensures that the individuals accessing the system are who they claim to be. By masquerading as a legitimate user, an attacker can bypass this security measure and gain unauthorized access to the system.
Reference: William Stallings, "Security in Computing".
Latest ICS-SCADA Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments