On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?
A. Privilege escalation
B. DNS cache poisoning
C. ARP poisoning
D. Man-in-the-middle
Answer: A
Computer Science & Information Technology
You might also like to view...
Variables and constants that are declared within a method are called ____ variables.
A. global B. temporary C. static D. local
Computer Science & Information Technology
The process of removing a local software application from your computer is called uninstalling.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Discuss whether it is possible to improve upon the ‘pull’ model of service discovery by multicasting (or broadcasting) and caching replies to queries.
What will be an ideal response?
Computer Science & Information Technology
If you wish to present traffic trends on your company's Website, a _____ format is preferable to tabular formats.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology