A _________ is an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.
A) clandestine user
B) superuser
C) masquerader
D) misfeasor
C) masquerader
You might also like to view...
Answer the following statements true (T) or false (F)
1. The Sub string method returns a string. 2. Methods for modifying strings do not actually modify the calling string object, but they return a modified copy of the calling string object. 3. A string object's To Upper method converts the first character in the string to uppercase. 4. When you call a string object's Split method, the method extracts tokens from the string and returns them as an array of integers.
How are forms often saved so they can be used repeatedly for data entry?
A) Styles B) Master Documents C) Reports D) Templates
When a Web browser renders nonprinting items in an HTML document, it _____ them.
A. prints B. ignores C. formats D. removes
Nessus is the premiere network vulnerability scanner
Indicate whether the statement is true or false.