A __________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection.
A) misfeasor
B) clandestine user
C) superuser
D) masquerader
B) clandestine user
You might also like to view...
Describe the process of exporting data from a query in Access to Microsoft Office Excel.
What will be an ideal response?
Clicking the Save button automatically stores a file using the original name, drive, and where it was previously stored.
Answer the following statement true (T) or false (F)
Which of the following is NOT considered an objective in ensuring probative information is recovered?
A) To protect the computer system during the actual investigation B) To determine if steganography was used C) To recover deleted, existing, hidden, and password protected files D) To search for any and all malware that may have infected the system
With the On Click animation timing, you can ________.
A) press Spacebar or click the mouse to animate the object
B) press Spacebar or F5 to animate the object
C) click the mouse or press the Shift key to animate the object
D) press the Alt key to animate the object