?Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.
A. ?privilege escalation attack
B. ?denial-of-service attack
C. ?malware penetration attack
D. ?identity management invasion
Answer: A
Computer Science & Information Technology
You might also like to view...
When a GUI element (such as a Button) should no longer be accessible by the user, it should be .
a) deleted b) hidden c) disabled d) All of the above.
Computer Science & Information Technology
Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology