Which of the following is the process of exploiting a bug or weakness in an operating system to allow a user to receive privileges to which they are not entitled?

A. privilege escalation
B. insecure direct object references
C. clickjacking
D. CSRF


A
Explanation: Privilege escalation is the process of exploiting a bug or weakness in an operating system to allow a user to receive privileges to which they are not entitled. These privileges can be used to delete files, view private information, or install unwanted programs, such as viruses.

Computer Science & Information Technology

You might also like to view...

Most banks offer ________ on site, which provide many of the functions formerly provided by a person

A) wire transfers B) direct deposits C) currency converters D) ATMs

Computer Science & Information Technology

In Microsoft Access 2016, the answer to a select query is returned in a query datasheet.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In Excel, you can insert a table beside another table in the same worksheet, and then work with the data in each table separately

Indicate whether the statement is true or false

Computer Science & Information Technology

The role of memory to store both data and programs is known as which of the following concepts?

A. stored program B. random memory C. ROM D. store and send

Computer Science & Information Technology