List of questions
Related questions
Question 477 - SY0-601 discussion
Which of the following describes the exploitation of an interactive process to gain access to restricted areas?
A.
Persistence
B.
Port scanning
C.
Privilege escalation
D.
Pharming
Your answer:
0 comments
Sorted by
Leave a comment first