A __________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection.

A) misfeasor
B) clandestine user
C) superuser
D) masquerader


B) clandestine user

Computer Science & Information Technology

You might also like to view...

Describe the process of exporting data from a query in Access to Microsoft Office Excel.

What will be an ideal response?

Computer Science & Information Technology

Clicking the Save button automatically stores a file using the original name, drive, and where it was previously stored.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is NOT considered an objective in ensuring probative information is recovered?

A) To protect the computer system during the actual investigation B) To determine if steganography was used C) To recover deleted, existing, hidden, and password protected files D) To search for any and all malware that may have infected the system

Computer Science & Information Technology

With the On Click animation timing, you can ________.

A) press Spacebar or click the mouse to animate the object
B) press Spacebar or F5 to animate the object
C) click the mouse or press the Shift key to animate the object
D) press the Alt key to animate the object

Computer Science & Information Technology