A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account. ?

A) ?sniffer ??
B) ?misfeasor
C) ?clandestine user ?
D) ?masquerader

D) ?masquerader

Computer Science & Information Technology

You might also like to view...

The purpose of a primary key is to ensure:

A) Record Repetition. B) Field Designation. C) Organization Management. D) Entity Integrity.

Computer Science & Information Technology

Owners of a SharePoint site are not allowed to create additional lists and libraries or modify site structure or permissions

Indicate whether the statement is true or false

Computer Science & Information Technology