A _________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.

A) superuser
B) misfeasor
C) masquerader
D) clandestine user


B) misfeasor

Computer Science & Information Technology

You might also like to view...

A function that calls itself either directly or indirectly (i.e., through another function) is a(n) ________ function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Asymmetric cryptographic algorithms are also known as private key cryptography.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A function that calculates the loan payment given the rate, number of periods (also known as term), and the present value of the loan (the principal).

What will be an ideal response?

Computer Science & Information Technology

A technician needs to perform a backup while a system is running. Which of the following services allows this task to be accomplished?

A. Robocopy B. Shadow copy C. Xcopy D. System restore

Computer Science & Information Technology