Which of the following describes the exploitation of an interactive process to gain access to restricted areas? A. Persistence B. Port scanning C. Privilege escalation D. Pharming Correct Answer: C This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer