Which of the following describes the exploitation of an interactive process to gain access to restncted areas?
A . Persistence
B. Buffer overflow
C. Privilege escalation
D. Pharming
Answer: C
Explanation:
https://en.wikipedia.org/wiki/Privilege_escalation#:~:text=Privilege%20escalation%20is%20the%20act,from%20an%20application%20or%20user
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund