BOMBSFAIR7033 BOMBSFAIR7033 04-01-2018 Computers and Technology contestada U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.