Which off the following BEST describes this type of attack?

An attacker has gained access to the company’s web server by using the administrator’s
credentials. The attacker then begins to work on compromising the sensitive data on other
servers. Which off the following BEST describes this type of attack?

An attacker has gained access to the company’s web server by using the administrator’s
credentials. The attacker then begins to work on compromising the sensitive data on other
servers. Which off the following BEST describes this type of attack?

A.
Privilege escalation

B.
Client-side attack

C.
Man-in-the-middle

D.
Transitive access



Leave a Reply 1

Your email address will not be published. Required fields are marked *

eighteen + fifteen =


jmurray

jmurray

Shouldn’t it be this one?

Privelege escalation: happens when one user acquires the system rights of another user. Network intruders have many techniques for increasing privileges …