What kind of malicious activity is performed by a lower-privileged user who accesses functions reserved for higher-privileged users?

IT Questions BankCategory: Ethical HackerWhat kind of malicious activity is performed by a lower-privileged user who accesses functions reserved for higher-privileged users?

What kind of malicious activity is performed by a lower-privileged user who accesses functions reserved for higher-privileged users?

  • horizontal privilege escalation
  • steganography
  • bind shell
  • vertical privilege escalation

Explanation: Privilege escalation is gaining access to resources that normally would be protected from an application or a user. With vertical privilege escalation, lower-privileged users access functions reserved for higher-privileged users, such as root or administrator access.

Exam with this question: 8.3.3 Quiz - Performing Post-Exploitation Techniques Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments