Challenge Type | Challenge Point | Time |
---|---|---|
QUIZ | 40 | 5 Minutes |
What is the model of the system vulnerability where an attacker can manage a system at the root using a user account?
- Spoofing Identity
- Tampering
- Repudiation
- Information Disclosure
- Elevation of privilege