You have just found a user who has performed an improper utilization of resources inside the organization both intentionally and unintentionally. This user has just provided you with a working example of which of the following?

A.
Intrusion
B.
Misuse
C.
Intrusion detection
D.
Misuse detection
E.
Anomaly detection
Correct answer is A