Computer Science, asked by deepikabalachandar20, 1 year ago

which of the following is/are example(s) of privilege escalation attack?

Answers

Answered by SOUNDWAVE123
2

Answer:

oh yeah last answer I guess

Answered by Agastya0606
0

The complete question is rewritten below as the above question is complete:

Which of the following is/are examples of privilege escalation attack?

a. an attacker with a privilege set of read only permissions somehow elevates the set to include "read and write".

b. An attacker prevents higher priority processes from running.

c. an attacker prevents access to resources by legitimate clients.

d. none of these.

ANSWER:

Among the given options above in the question, the example of privilege escalation attack is option a) an attacker with a privilege set of read only permissions somehow elevates the set to include "read and write".

Intrusion of network that directly enables the attacker to access the network and also the data and applications associated to it is called privilege escalation attack.

This type of attack is mainly done by causing programming error or flaw designing.

Similar questions