A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account. ?
A) ?sniffer ??
B) ?misfeasor
C) ?clandestine user ?
D) ?masquerader
D) ?masquerader
Computer Science & Information Technology
You might also like to view...
The purpose of a primary key is to ensure:
A) Record Repetition. B) Field Designation. C) Organization Management. D) Entity Integrity.
Computer Science & Information Technology
Owners of a SharePoint site are not allowed to create additional lists and libraries or modify site structure or permissions
Indicate whether the statement is true or false
Computer Science & Information Technology