Which of the following describes the exploitation of an interactive process to gain access to restncted areas?
Which of the following describes the exploitation of an interactive process to gain access to restncted areas?
A . Persistence
B. Buffer overflow
C. Privilege escalation
D. Pharming
Answer: C
Explanation:
https://en.wikipedia.org/wiki/Privilege_escalation#:~:text=Privilege%20escalation%20is%20the%20act,from%20an%20application%20or%20user
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments