Skip to content

Latest commit

 

History

History
15 lines (11 loc) · 433 Bytes

Security-Principle-3.md

File metadata and controls

15 lines (11 loc) · 433 Bytes

Security Principle 3

Challenge Type Challenge Point Time
QUIZ 40 5 Minutes

Challenge Description

What is the model of the system vulnerability where an attacker can manage a system at the root using a user account?

  • Spoofing Identity
  • Tampering
  • Repudiation
  • Information Disclosure
  • Elevation of privilege