A ________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection. ?
A. clandestine user ?
B. misfeasor
C. masquerader ??
D. mole
A. clandestine user ?
Computer Science & Information Technology
You might also like to view...
Which of the following is not true about your appearance?
A) It is acceptable to wear a hat during your presentation if it matches what you are wearing. B) You will be more confident if you are comfortable in your clothing. C) Make a last minute stop in front of a mirror before your presentation. D) Appearance is another aspect of being prepared.
Computer Science & Information Technology
The year you were born determines the generation you fit into
Indicate whether the statement is true or false
Computer Science & Information Technology