What is the difference between authentication and authorization?
How is authorization managed in access control models?
What is the principle of least privilege?
Users should only be given the minimum access necessary to perform their job
reducing the risk of unauthorized access
What are the two types of privilege escalation attacks?
common methods of executing privilege escalation attacks?