If privileges are greater than those already available to the attacker the result is a _________.

Fill in the blank(s) with the appropriate word(s).


privilege escalation

Computer Science & Information Technology

You might also like to view...

Because a vector container uses a dynamically allocated array to hold its elements, it is common for the vector class to allocate

a. less memory than it needs b. more memory than it needs c. a separate memory location for copies of new elements d. None of these

Computer Science & Information Technology

Notes concerning the active slide are entered into the Slide pane

Indicate whether the statement is true or false

Computer Science & Information Technology

If you want to turn off grand totals for columns on a PivotTable, select this option in the Grand Totals options

A) On for Columns Only B) Off for Rows and Columns C) On for Rows Only D) On for Rows and Columns

Computer Science & Information Technology

Rootkits can be used to give the attacker a backdoor access to the system

Indicate whether the statement is true or false.

Computer Science & Information Technology