Which of the following is/are examples of privilege escalation attack
Answers
The above given question is incomplete. So the complete question is rewritten below as follows:
Which of the following is/are examples of privilege escalation attack?
a. an attacker with a privilege set of read only permissions somehow elevates the set to include "read and write".
b. An attacker prevents higher priority processes from running.
c. an attacker prevents access to resources by legitimate clients.
d. none of these.
ANSWER:
From the above given options, the example of privilege escalation attack is option a) an attacker with a privilege set of read only permissions somehow elevates the set to include "read and write".
Intrusion of network that directly enables the attacker to access the network and also the data and applications associated to it is called privilege escalation attack.
This type of attack is mainly done by causing programming error or flaw designing.