Which of the following is the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user?

A. Backdoor
B. Privilege escalation
C. Weak password
D. DDoS


B. Privilege escalation is the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user.

Computer Science & Information Technology

You might also like to view...

A subroutine ends with a(n) ____ statement.

A. Sub B. End Sub C. Exit Sub D. Option Compare

Computer Science & Information Technology

Forum rooms provide a synchronous environment in which a group of participants share text-based information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Web designers should avoid using graphic animations that run continuously because they distract and irritate Web site visitors

Indicate whether the statement is true or false

Computer Science & Information Technology

The command-line tool to stop or restart AD DS is _____________

a. Ldp.exe b. Net.exe c. Ntds.exe d. None of the above.

Computer Science & Information Technology