A _________ is an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.

A) clandestine user
B) superuser
C) masquerader
D) misfeasor

C) masquerader

Computer Science & Information Technology

You might also like to view...

When using the Filter and Sort dialog box, what is the maximum number of different fields that can be used when sorting?

A) 1 B) 2 C) 3 D) 4

Computer Science & Information Technology

In Visual Basic Editor, the ________ window is where all the Visual Basic language is typed, and where macro data can be viewed

A) Code B) Properties C) Macro D) Graphic

Computer Science & Information Technology