Which of the following describes the exploitation of an interactive process to gain access to restncted areas?

Which of the following describes the exploitation of an interactive process to gain access to restncted areas?
A . Persistence
B. Buffer overflow
C. Privilege escalation
D. Pharming

Answer: C

Explanation:

https://en.wikipedia.org/wiki/Privilege_escalation#:~:text=Privilege%20escalation%20is%20the%20act,from%20an%20application%20or%20user

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments