Which of the following is the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user?

A. Backdoor
B. Privilege escalation
C. Weak password
D. DDoS

B. Privilege escalation is the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Class SecureRandom’s methods ints, longs and doubles (inherited from class Random) return IntStream, LongStream and DoubleStream, respectively, for streams of random numbers. b. SecureRandom method ints with no arguments creates an IntStream for an infinite stream of random int values. c. An infinite stream is a stream with an unknown number of elements—you use an intermediate operation to complete processing on an infinite stream. d. SecureRandom method ints with a long argument creates an IntStream with the specified number of random int values.

Computer Science & Information Technology

What are two important reasons to virtualize?

What will be an ideal response?

Computer Science & Information Technology