Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
A . Privilege escalation
B . Pivoting
C . Process affinity
D . Buffer overflow
Answer: A
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund