A ________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection. ?

A. clandestine user ?
B. misfeasor
C. masquerader ??
D. mole

A. clandestine user ?

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about your appearance?

A) It is acceptable to wear a hat during your presentation if it matches what you are wearing. B) You will be more confident if you are comfortable in your clothing. C) Make a last minute stop in front of a mirror before your presentation. D) Appearance is another aspect of being prepared.

Computer Science & Information Technology

The year you were born determines the generation you fit into

Indicate whether the statement is true or false

Computer Science & Information Technology