A ________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection. ?
A. clandestine user ?
B. misfeasor
C. masquerader ??
D. mole
A. clandestine user ?
Computer Science & Information Technology
You might also like to view...
Which of the following NIST publications is known as The NIST Handbook?
A) SP 800-12 B) SP 800-16 C) SP 800-50 D) SP 800-100
Computer Science & Information Technology
Use the output from ethereal and the MAC forwarding tables to explain why some packets are looping indefinitely.
What will be an ideal response?
Computer Science & Information Technology
A list or table that is used to create a PivotTable or PivotChart report that comes from an Excel list or external data base is called ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
A(n) _________________________ is a consumer portal whose content you customize to meet your specific needs.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology