James, a malicious actor, aims to exploit a vulnerability in an application that neglects to confirm whether the user is authorized to access an internal object based on its name or key. Which of the subsequent queries most aptly characterizes an endeavor to leverage an insecure direct object using the name of the legitimate account "User 1"?