Security Principle 3

Challenge Type Challenge Point Time
QUIZ 40 5 Minutes

Challenge Description

What is the model of the system vulnerability where an attacker can manage a system at the root using a user account?