?Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.

A. ?privilege escalation attack
B. ?denial-of-service attack
C. ?malware penetration attack
D. ?identity management invasion

Answer: A

Computer Science & Information Technology

You might also like to view...

When a GUI element (such as a Button) should no longer be accessible by the user, it should be .

a) deleted b) hidden c) disabled d) All of the above.

Computer Science & Information Technology

Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology