Question 76:
Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
Answer options:
A. Privilege escalation B. Pivoting C. Process affinity D. Buffer overflow
Answer correct:
A