Q: 1
Which component of the IT Security Model is attacked with masquerade?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.