Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?

A. Privilege escalation
B. Pivoting
C. Process affinity
D. Buffer overflow

Answer: A. Privilege escalation

Computer Science & Information Technology

You might also like to view...

Match the navigation method with the navigation option in PowerPoint 2013:

I. Press N II. Press P III. Press Esc IV. Type a slide number and press Enter V. Press F1 A. returns to a previous slide B. ends a slide show C. shows a list of slide show controls D. advance through the slide show E. goes to a specific slide

Computer Science & Information Technology

The ________ feature enables the user to insert data from an Access table in various formats

A) Paste B) Merge Formatting C) Paste Special D) Keep Source Formatting

Computer Science & Information Technology