An unauthorized user intercepted a user’s password and used this information to obtain the company’s administrator password. The unauthorized user can use the administrators password to access sensitive information pertaining to client data. Which of the following is this an example of?
A.
Session hijacking
B.
Least privilege
C.
Privilege escalation
D.
Network address translation