Skip to main content

Section 5.8 Review Questions

  1. What can MAC address spoofing allow an attacker to do? What steps can be taken to mitigate this risk?
  2. What is the difference between horizontal and vertical privilege escalation? Give an example of each.
  3. What is XSS and how can it be used in an attack?
You have attempted 1 of 1 activities on this page.