Which of the following is this an example of?

An unauthorized user intercepted a user’s password and used this information to obtain the company’s administrator password. The unauthorized user can use the administrators password to access sensitive information pertaining to client data. Which of the following is this an example of?

An unauthorized user intercepted a user’s password and used this information to obtain the company’s administrator password. The unauthorized user can use the administrators password to access sensitive information pertaining to client data. Which of the following is this an example of?

A.
Session hijacking

B.
Least privilege

C.
Privilege escalation

D.
Network address translation



Leave a Reply 0

Your email address will not be published. Required fields are marked *