A _________ is an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.

A) clandestine user
B) superuser
C) masquerader
D) misfeasor


C) masquerader

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The Sub string method returns a string. 2. Methods for modifying strings do not actually modify the calling string object, but they return a modified copy of the calling string object. 3. A string object's To Upper method converts the first character in the string to uppercase. 4. When you call a string object's Split method, the method extracts tokens from the string and returns them as an array of integers.

Computer Science & Information Technology

How are forms often saved so they can be used repeatedly for data entry?

A) Styles B) Master Documents C) Reports D) Templates

Computer Science & Information Technology

When a Web browser renders nonprinting items in an HTML document, it _____ them.

A. prints B. ignores C. formats D. removes

Computer Science & Information Technology

Nessus is the premiere network vulnerability scanner

Indicate whether the statement is true or false.

Computer Science & Information Technology