pink5104 pink5104 23-05-2023 Computers and Technology contestada Which of the following uses vulnerable applications to modify Microsoft registry keys? A. Quarantine B Executable files attack C. System tampering D. Process spawning control