COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following can be described as the act of exploiting a bug or flaw in software to gain access to resources that normally would be protected?
A
Privilege escalations
B
Chain of custody
C
Default account
D
Backdoor
Explanation: 

Detailed explanation-1: -Privilege escalation is the act of exploiting a bug, design flaw, configuration oversight in operating system, software application or web application which allows the user to access information, features or functionality that they are not entitled to in their role.

Detailed explanation-2: -Vertical privilege escalation-an attacker attempts to gain more permissions or access with an existing account they have compromised. For example, an attacker takes over a regular user account on a network and attempts to gain administrative permissions or root access.

Detailed explanation-3: -A privilege escalation attack is a cyberattack designed to gain unauthorized privileged access into a system. Attackers exploit human behaviors, design flaws or oversights in operating systems or web applications.

Detailed explanation-4: -Privilege escalation in cybersecurity is a malicious attempt to abuse an app or OS bug or error of configuration in order to gain unauthorized access to sensitive information.

There is 1 question to complete.