A recent audit shows that a user logged into a server with their user account and executed a program. The user then performed activities only available to an administrator. This is an example of an attack?
A.
Trojan horse
B.
Privilege escalation
C.
Subseven back door
D.
Security policy removal
Explanation:
A user obtaining access to a resource they would not normally be able to access. This is done inadvertently by running a program with SUID (Set User ID) or SGID (Set Group ID) permissions – or by temporarily becoming another user.
Reference: Security + (SYBEX) page 522