__________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources

Fill in the blank with the appropriate phrase.
__________________ is the process of obtaining access using legitimate credentials, and then
attempting to leverage that into access to unauthorized system resources.

Fill in the blank with the appropriate phrase.
__________________ is the process of obtaining access using legitimate credentials, and then
attempting to leverage that into access to unauthorized system resources.

Answer: Privilege escalation

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *