CompTIA Security+ SY0-601 – Question024

Which of the following describes the exploitation of an interactive process to gain access to restricted areas?


A.
Persistence
B. Buffer overflow
C. Privilege escalation
D. Pharming

Correct Answer: C