Which of the following is the process of exploiting a bug or weakness in an operating system to allow a user to receive privileges to which they are not entitled?

A. privilege escalation
B. insecure direct object references
C. clickjacking
D. CSRF

A
Explanation: Privilege escalation is the process of exploiting a bug or weakness in an operating system to allow a user to receive privileges to which they are not entitled. These privileges can be used to delete files, view private information, or install unwanted programs, such as viruses.

Computer Science & Information Technology

You might also like to view...

You can customize the Ribbon

Indicate whether the statement is true or false

Computer Science & Information Technology

The fill handle:

A) is a red bolded circle at the bottom-right of an active cell. B) helps carry over the fill in an active cell to another range. C) is a small green square at the bottom-right corner of a cell. D) is the same action as pressing the Enter key.

Computer Science & Information Technology