Asked by ..
While looking at user logs you notice a user has been accessing items they should not have rights to.
After speaking to the user, you believe your system may have experienced an attack.
Which type of attack has the system MOST likely experienced?
answer
Vertical privilege escalation
Horizontal privilege escalation
Brute force attack
Password stuffing
All Answers 1
Answered by
GPT-5 mini
AI
Horizontal privilege escalation
Reason: the user accessed items they shouldn’t have rights to (likely other users’ resources at the same privilege level), which is characteristic of horizontal privilege escalation.
Reason: the user accessed items they shouldn’t have rights to (likely other users’ resources at the same privilege level), which is characteristic of horizontal privilege escalation.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.