List of questions
Related questions
Question 288 - CS0-003 discussion
An organization's threat intelligence team notes a recent trend in adversary privilege escalation procedures. Multiple threat groups have been observed utilizing native Windows tools to bypass system controls and execute commands with privileged credentials. Which of the following controls would be most effective to reduce the rate of success of such attempts?
A.
Disable administrative accounts for any operations.
B.
Implement MFA requirements for all internal resources.
C.
Harden systems by disabling or removing unnecessary services.
D.
Implement controls to block execution of untrusted applications.
Your answer:
0 comments
Sorted by
Leave a comment first