Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
A. Privilege escalation
B. Pivoting
C. Process affinity
D. Buffer overflow
Answer: A. Privilege escalation
You might also like to view...
Answer the following statements true (T) or false (F)
1. At the stage of full systems testing with live data, operators and end-users become actively involved in testing. 2. Maintenance is performed most often to improve the existing software, rather than to respond to crisis or system failure. 3. Reducing maintenance costs is a major concern, because software maintenance alone can devour upward of 50 percent of the total data processing budget for a business. 4. If the reliability of a telecommunications network is high, it is possible to use a distributed system for business.
For the given class, which of the following would be the best hashCode function implementation?
public class Employee { private String name, surname; public Employee(String name, String surname) { this.name = name; this.surname = surname; } } a. public int hashCode() { return this.name + this.surname; } b. public int hashCode() { return 1; } c. public int hashCode() { return (int)(Math.random() * 100); } d. public String hashCode() { return this.surname.concat(this.name); }
____ links are links to Web pages or files on a different Web site.
A. Alternative B. External C. Internal D. Common
Access specifiers control a client's access to individual data members and member functions.
Answer the following statement true (T) or false (F)