John covertly learns the user ID and password of a higher-ranked technician and uses the credentials to access certain areas of a network. What term describes what John has done?
A.
IP spoofing
B.
Backdooring
C.
Masquerading
D.
Data diddling
Explanation:
Masquerading is a term that describes a person who pretends to be an authorized user
to circumvent established controls.