Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
A . Privilege escalation
B . Pivoting
C . Process affinity
D . Buffer overflow
Answer: A
Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
A . Privilege escalation
B . Pivoting
C . Process affinity
D . Buffer overflow
Answer: A