Which of the following is this an example of?

An administrator is worried about an attacker using a compromised user account to gain administrator access to a system. Which of the following is this an example of?

An administrator is worried about an attacker using a compromised user account to gain administrator access to a system. Which of the following is this an example of?

A.
Man-in-the-middle attack

B.
Protocol analysis

C.
Privilege escalation

D.
Cross-site scripting



Leave a Reply 0

Your email address will not be published. Required fields are marked *