ExamQuestions.com

Register
Login
CompTIA Security+ Exam Questions

CompTIA

CompTIA Security+

559 / 570

Question 559:

After discovering the /etc/shadow file had been rewritten, a security administrator noticed an application insecurely creating files in / tmp. Which of the following vulnerabilities has MOST likely been exploited? 

Answer options:

A. Privilege escalation
B. Resource exhaustion
C. Memory leak
D. Pointer dereference