Which of the following is the process of exploiting a bug or weakness in an operating system to allow a user to receive privileges to which they are not entitled?
A. privilege escalation
B. insecure direct object references
C. clickjacking
D. CSRF
A
Explanation: Privilege escalation is the process of exploiting a bug or weakness in an operating system to allow a user to receive privileges to which they are not entitled. These privileges can be used to delete files, view private information, or install unwanted programs, such as viruses.
Computer Science & Information Technology
You might also like to view...
You can customize the Ribbon
Indicate whether the statement is true or false
Computer Science & Information Technology
The fill handle:
A) is a red bolded circle at the bottom-right of an active cell. B) helps carry over the fill in an active cell to another range. C) is a small green square at the bottom-right corner of a cell. D) is the same action as pressing the Enter key.
Computer Science & Information Technology