which three attacks give a user elevated privileges to access resources that are otherwise blocked?
seenagape
In an operating system environment, which three attacks give a user elevated privileges to access resources that are otherwise blocked? (Choose three.)