During a routine review of system logs, an administrator notices that a network printer has made several authentication requests to a database server. Which type of anomalous behavior does this best represent?
Risky behavior
Unintentional error
Intentional misuse
Unexpected behavior