which of the following is/are examples of privilege escalation attack?
a. an attacker with a privilege set of read only permissions somehow elevates the set to include "read and write"
b. An attacker prevents higher priority processes from running.
c. an attacker prevents access to resources by legitimate clients.
d. none of these
Answers
Answered by
8
Answer:
An attacker with a privilage set of read only permissions someone elevates the set to include A
Answered by
0
Answer:
The example of privilege escalation attack is option a) an attacker with a privilege set of read only permissions somehow elevates the set to include "read and write".
Intrusion of network that directly enables the attacker to access the network and also the data and applications associated to it is called privilege escalation attack.
This type of attack is mainly done by causing programming error or flaw designing.
Similar questions