Which of the following uses vulnerable applications to modify Microsoft registry
keys?
A. Quarantine
B Executable files attack
C. System tampering
D. Process spawning control