Which of the following is an example of privilege escalation?
A. A hacker accesses a printer from the Internet, then the print server, and then the domain controller
B. A hacker sends many oversized ping packets.
C. A hacker convinces a user to reveal a password.
D. A hacker follows a user into the facility.
A
Explanation: When systems are accessed by unauthorized personal a privilege escalation has occurred.
You might also like to view...
The cropped portion of an image is ________
A) canceled B) erased C) deleted D) hidden
What is the firewall port used by the NFS server?
A. 49 B. 249 C. 1049 D. 2049
Windows Server 2016 requires activation within 90 days after installation.
Answer the following statement true (T) or false (F)
You create an empty document fragment using the ____ method.?
A. ?cloneNode() B. ?createElement() C. ?submit() D. ?createDocumentFragment()