• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which cloud technology attack method could exploit a bug in a software application to gain access to resources that normally would not be accessible to a user?

  • account takeover
  • credential harvesting
  • privilege escalation
  • side-channel attacks

Explanation & Hint:

Privilege escalation is exploiting a bug or design flaw in a software or firmware application to access resources normally protected from an application or a user.

For more Questions and Answers:

7.3.3 Quiz – Cloud, Mobile, and IoT Security Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments