A ________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection. ?

A. clandestine user ?
B. misfeasor
C. masquerader ??
D. mole


A. clandestine user ?

Computer Science & Information Technology

You might also like to view...

Which of the following NIST publications is known as The NIST Handbook?

A) SP 800-12 B) SP 800-16 C) SP 800-50 D) SP 800-100

Computer Science & Information Technology

Use the output from ethereal and the MAC forwarding tables to explain why some packets are looping indefinitely.

What will be an ideal response?

Computer Science & Information Technology

A list or table that is used to create a PivotTable or PivotChart report that comes from an Excel list or external data base is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) _________________________ is a consumer portal whose content you customize to meet your specific needs.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology