Accessing a system or application using permissions from another users account is a form of which of the following?
A.
Phishing
B.
Domain kiting
C.
ARP spoofing
D.
Privilege escalation
Accessing a system or application using permissions from another users account is a form of which of the following?
Accessing a system or application using permissions from another users account is a form of which of the following?
A.
Phishing
B.
Domain kiting
C.
ARP spoofing
D.
Privilege escalation