On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?

A. Privilege escalation
B. DNS cache poisoning
C. ARP poisoning
D. Man-in-the-middle


Answer: A

Computer Science & Information Technology

You might also like to view...

Variables and constants that are declared within a method are called ____ variables.

A. global B. temporary C. static D. local

Computer Science & Information Technology

The process of removing a local software application from your computer is called uninstalling.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Discuss whether it is possible to improve upon the ‘pull’ model of service discovery by multicasting (or broadcasting) and caching replies to queries.

What will be an ideal response?

Computer Science & Information Technology

If you wish to present traffic trends on your company's Website, a  _____ format is preferable to tabular formats.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology