Tracking events in which group membership has changed or rights have been elevated gives security professionals a warning that ____ is occurring.

A. privilege escalation
B. directory traversal
C. auditing
D. data leakage


Answer: A

Computer Science & Information Technology

You might also like to view...

By clicking the ____ button, we can test a program to see if it produces the desired result.

A. Run B. Create C. Build D. Assemble

Computer Science & Information Technology

The term ____ refers to software tools used to conceal malware and backdoors that have been installed on a victim's computer.

A. computer virus B. rootkit C. Trojan horse D. bot

Computer Science & Information Technology

The active window displays a darker title bar than other windows on the screen

Indicate whether the statement is true or false

Computer Science & Information Technology

Alexamara owns ____ marinas.

A. 2 B. 3 C. 4 D. 5

Computer Science & Information Technology