Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
A. Privilege escalation
B. Pivoting
C. Process affinity
D. Buffer overflow
Answer: A. Privilege escalation
Computer Science & Information Technology
You might also like to view...
Match the navigation method with the navigation option in PowerPoint 2013:
I. Press N II. Press P III. Press Esc IV. Type a slide number and press Enter V. Press F1 A. returns to a previous slide B. ends a slide show C. shows a list of slide show controls D. advance through the slide show E. goes to a specific slide
Computer Science & Information Technology
The ________ feature enables the user to insert data from an Access table in various formats
A) Paste B) Merge Formatting C) Paste Special D) Keep Source Formatting
Computer Science & Information Technology