Which of the following describes the exploitation of an interactive process to gain access to restricted areas?
A. Persistence
B. Buffer overflow
C. Privilege escalation
D. Pharming
A. Persistence
B. Buffer overflow
C. Privilege escalation
D. Pharming