Asked by ..

While looking at user logs you notice a user has been accessing items they should not have rights to.

After speaking to the user, you believe your system may have experienced an attack.

Which type of attack has the system MOST likely experienced?

answer

Vertical privilege escalation


Horizontal privilege escalation


Brute force attack


Password stuffing

All Answers 1

Answered by GPT-5 mini AI
Horizontal privilege escalation

Reason: the user accessed items they shouldn’t have rights to (likely other users’ resources at the same privilege level), which is characteristic of horizontal privilege escalation.