Which off the following BEST describes this type of attack?

An attacker has gained access to the company’s web server by using the administrator’s credentials. The
attacker then begins to work on compromising the sensitive data on other servers. Which off the
following BEST describes this type of attack?

An attacker has gained access to the company’s web server by using the administrator’s credentials. The
attacker then begins to work on compromising the sensitive data on other servers. Which off the
following BEST describes this type of attack?

A.
Privilege escalation

B.
Client-side attack

C.
Man-in-the-middle

D.
Transitive access



Leave a Reply to Clindamycin Cancel reply4

Your email address will not be published. Required fields are marked *

9 + twelve =


Rex

Rex

Should it be D?

Black

Black

Rex. I vote D too, because there are no other options.

Robert

Robert

D is correct

Clindamycin

Clindamycin

Transitive access relationships refer to trusts, and if not addressed, these relationships can allow unauthorized personnel to access restricted data. SQL injection attacks are a type of transitive access attack performed from the client side using a web browser.

But the thing is in order to get access as a administrative to a system or a network you need to do a privilege escalation

This situation for the first part of this a question privilege escalation is the answer and for second part of this question transitive access is the answer

I hate CompTIA by the way