You work as the security administrator at Certpaper.com. One morning you discover that a user
named Mia Hamm has used her user account to log on to a network server. Mia has then
executed a program and been able to perform operations which only a network administrator or
security administrator should be able to. What type of attack has occurred?
A.
Trojan horse.
B.
Security policy removal.
C.
Privilege escalation attack.
D.
Subseven back door.
Explanation:
A user obtaining access to a resource they would not normally be able to access. This is done
inadvertently by running a program with SUID (Set User ID) or SGID (Set Group ID) permissions -or by temporarily becoming another user.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 522