ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 288 - CS0-003 discussion

Report
Export

An organization's threat intelligence team notes a recent trend in adversary privilege escalation procedures. Multiple threat groups have been observed utilizing native Windows tools to bypass system controls and execute commands with privileged credentials. Which of the following controls would be most effective to reduce the rate of success of such attempts?

A.
Disable administrative accounts for any operations.
Answers
A.
Disable administrative accounts for any operations.
B.
Implement MFA requirements for all internal resources.
Answers
B.
Implement MFA requirements for all internal resources.
C.
Harden systems by disabling or removing unnecessary services.
Answers
C.
Harden systems by disabling or removing unnecessary services.
D.
Implement controls to block execution of untrusted applications.
Answers
D.
Implement controls to block execution of untrusted applications.
Suggested answer: D

Explanation:

Implementing controls to block execution of untrusted applications can prevent privilege escalation attacks that leverage native Windows tools, such as PowerShell, WMIC, or Rundll32. These tools can be used by attackers to run malicious code or commands with elevated privileges, bypassing system security policies and controls. By restricting the execution of untrusted applications, organizations can reduce the attack surface and limit the potential damage of privilege escalation attacks.

asked 02/10/2024
Juan Contreras
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first