Explain how an attacker can use privilege escalation to gain access to a resources that are restricted?

What will be an ideal response?


One type of privilege escalation is when a user with a lower privilege uses privilege escalation to grant herself access to functions reserved for higher-privilege users. Another type of privilege escalation is when a user with restricted privileges accesses the different restricted functions of a similar user.

Computer Science & Information Technology

You might also like to view...

A Date literal can contain _____________.

a. a date b. a time c. a floating-point value d. both a date and a time

Computer Science & Information Technology

Which of the following is a valid example of a file identifier in the header of a file?

a. ~~~*PH b. START __ -- __ -- PNG c. %PNG d. None of the above

Computer Science & Information Technology

Whether you use the methodology defined by the EIA/TIA 606 standard, or come up with your own internal code, it is important for you to place __________________ on the front of patch panels to identify the cables.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ feature allows formulas to refer to table columns by names that are automatically generated when you create a table.

A. calculated formula B. structured reference C. sort by name D. structured name

Computer Science & Information Technology