A _________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.

A) superuser
B) misfeasor
C) masquerader
D) clandestine user

B) misfeasor

Computer Science & Information Technology

You might also like to view...

When a report is exported to Word, it is saved as a(n) ________ file

A) Rich Text Format B) Document C) Text D) PDF

Computer Science & Information Technology

Visual Basic provides the ____ method for accessing any number of characters contained in a string.

A. Portion B. PartialString C. Substring D. PieceString

Computer Science & Information Technology