A developer reviewing a newly built web portal noticed that unauthorized changes were inserted into system files, causing the displayed data to appear altered. Which type of threat best describes this situation?
Unapproved modification of system commands that alters valid output
Forged identity usage that mimics valid user credentials
Unwanted exposure of restricted account details
Excess data consumption that reduces resource availability
Altering system files to produce incorrect output demonstrates unauthorized modification. The other options describe different forms of attacks, such as forging identities, overwhelming resources, or extracting sensitive data. They do not involve active manipulation of existing content to change the system’s output.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is unauthorized modification in cybersecurity?
Open an interactive chat with Bash
How does altering system files differ from other types of attacks?
Open an interactive chat with Bash
What measures can prevent unauthorized modifications in a web portal?