Which of the following is an example of privilege escalation?

A. A hacker accesses a printer from the Internet, then the print server, and then the domain controller
B. A hacker sends many oversized ping packets.
C. A hacker convinces a user to reveal a password.
D. A hacker follows a user into the facility.


A
Explanation: When systems are accessed by unauthorized personal a privilege escalation has occurred.

Computer Science & Information Technology

You might also like to view...

The cropped portion of an image is ________

A) canceled B) erased C) deleted D) hidden

Computer Science & Information Technology

What is the firewall port used by the NFS server?

A. 49 B. 249 C. 1049 D. 2049

Computer Science & Information Technology

Windows Server 2016 requires activation within 90 days after installation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You create an empty document fragment using the ____ method.?

A. ?cloneNode() B. ?createElement() C. ?submit() D. ?createDocumentFragment()

Computer Science & Information Technology