A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account. ?

A) ?sniffer ??
B) ?misfeasor
C) ?clandestine user ?
D) ?masquerader


D) ?masquerader

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. If I have already written the #include header, I can overload operator<< for class A as follows: std::ostream& operator<< (std::ostream& out,const A& obj); 2. You have a helping function that is not a member of your class. You want your class member functions to be able to see it and use it but no other file in your program may see it. You can place it in an unnamed namespace to make it invisible from outside the file.

Computer Science & Information Technology

If multiple piconets cover the same area, a Bluetooth device can be a member in two or more overlaying piconets.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What yast command option opens YaST in text mode?

A. --text B. --opentext C. --ncurses D. --nogui

Computer Science & Information Technology

To cancel an entire entry before entering it into the cell, press the ____ key.

A. COMMAND B. ESC C. CONTROL D. TAB

Computer Science & Information Technology