__________ is exploiting a vulnerability in the software to gain access to resources that
the user would normally be restricted from obtaining.
a. Vulnerability assessment
b. Software threat release (STR)
c. Hardware virus
d. Privilege escalation
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here