Which cloud technology attack method could exploit a bug in a software application to gain access to resources that normally would not be accessible to a user?

IT Questions BankCategory: Ethical HackerWhich cloud technology attack method could exploit a bug in a software application to gain access to resources that normally would not be accessible to a user?

Which cloud technology attack method could exploit a bug in a software application to gain access to resources that normally would not be accessible to a user?

  • account takeover
  • credential harvesting
  • privilege escalation
  • side-channel attacks

Explanation: Privilege escalation is exploiting a bug or design flaw in a software or firmware application to access resources normally protected from an application or a user.

Exam with this question: 7.3.3 Quiz - Cloud, Mobile, and IoT Security Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x