which of the following is/are examples of privilege escalation attack?a. an attacker with a privilege set of read only permissions somehow elevates the set to include "read and write"b. An attacker prevents higher priority processes from running. c. an attacker prevents access to resources by legitimate clients. d. none of these
Answers
Answered by
0
Answer:
Option D)
Explaination
A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.
Similar questions