Multiple Choice
Which technique is used to evade detection from security products by executing arbitrary code in the address space of a separate live operation?
A) process injection
B) privilege escalation
C) GPO modification
D) token manipulation
Correct Answer:
Verified
Related Questions