Which cloud technology attack method could exploit a bug in a software application to gain access to resources that normally would not be accessible to a user?
- account takeover
- credential harvesting
- privilege escalation
- side-channel attacks
Explanation & Hint: Privilege escalation is exploiting a bug or design flaw in a software or firmware application to access resources normally protected from an application or a user. |