A _________ is an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.
A) clandestine user
B) superuser
C) masquerader
D) misfeasor
C) masquerader
Computer Science & Information Technology
You might also like to view...
When using the Filter and Sort dialog box, what is the maximum number of different fields that can be used when sorting?
A) 1 B) 2 C) 3 D) 4
Computer Science & Information Technology
In Visual Basic Editor, the ________ window is where all the Visual Basic language is typed, and where macro data can be viewed
A) Code B) Properties C) Macro D) Graphic
Computer Science & Information Technology