Watch this video on YouTube
Which of the following techniques do attackers use to escalate privileges in the Windows operating system?