Prepare for your Digital Forensic Certification Exam. Use flashcards and multiple-choice questions with detailed hints and explanations to ensure success on your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of cyberattack did Benjamin perform when he gained elevated permissions to access restricted parts of the network?

  1. External attack

  2. Privilege escalation attack

  3. Internal attack

  4. Intellectual property theft

The correct answer is: Privilege escalation attack

A privilege escalation attack occurs when an attacker gains elevated permissions or access beyond what is normally allowed for a user. In this scenario, Benjamin's actions indicate that he successfully exploited vulnerabilities in the system to elevate his access privileges, allowing him to enter restricted areas of the network. This type of attack typically involves leveraging an existing legitimate account or exploiting security flaws to gain unauthorized access to that higher level of permissions, making it a specific and often targeted form of cyberattack. In contrast, an external attack generally refers to methods where attackers originate from outside an organization, attempting to breach defenses, while an internal attack involves actions taken by someone within the organization who may exploit their access for harmful purposes. Intellectual property theft involves the unauthorized access or theft of proprietary information, which may or may not include privilege escalation as part of that process but is not specifically focused on the act of gaining elevated access rights. Thus, the nature of Benjamin's actions distinctly aligns with that of a privilege escalation attack.