Which of the following describes the exploitation of an interactive process to gain access to restricted areas?
A. Persistence
B. Port scanning
C. Privilege escalation
D. Pharming
A. Persistence
B. Port scanning
C. Privilege escalation
D. Pharming