Privilege Escalation

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Q: In his Network Security Administrator position, Vernard has the responsibility to observe, secure and analyze the network of his company. At the moment, Vernard is most concerned to learn that it is possible for others to utilize bypass authentication in order to access his company’s network. This gives them more permissions than they were intended to have, and creates a vulnerability that could compromise his company’s data, secrets and client list. What is the name used for this activity, which is often called privilege escalation?


a. Rootkit

b. Boot sector

c. Master Boot Record

d. Backdoor

View Topics

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel