__________ are attacks that attempt to give ordinary users root access.

A. Privilege-escalation exploits B. Directory transversals

C. File system access D. Modification of system resource

A. Privilege-escalation exploits

Computer Science & Information Technology

You might also like to view...

The Collect Data group on the External Data Tab allows a user to import data into a database

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is NOT one of the three cost types to consider when calculating the break-even point?

A) Variable costs B) Mixed costs C) Fixed costs D) Alternative costs

Computer Science & Information Technology