Which of the following techniques involves exploiting a vulnerability in a software application to gain elevated privileges?
Buffer overflow
Cross-site scripting
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Network Ethical Hacking Exercises are loading ...