Tracking events in which group membership has changed or rights have been elevated gives security professionals a warning that ____ is occurring.
A. privilege escalation
B. directory traversal
C. auditing
D. data leakage
Answer: A
Computer Science & Information Technology
You might also like to view...
By clicking the ____ button, we can test a program to see if it produces the desired result.
A. Run B. Create C. Build D. Assemble
Computer Science & Information Technology
The term ____ refers to software tools used to conceal malware and backdoors that have been installed on a victim's computer.
A. computer virus B. rootkit C. Trojan horse D. bot
Computer Science & Information Technology
The active window displays a darker title bar than other windows on the screen
Indicate whether the statement is true or false
Computer Science & Information Technology
Alexamara owns ____ marinas.
A. 2 B. 3 C. 4 D. 5
Computer Science & Information Technology