Question: Security Assessment and Testing Which operating systems allows users to temporarily elevate their privileges in order to launch an application at a higher privilege level?
Security Assessment and Testing
Which operating systems allows users to temporarily elevate their privileges in order to launch an application at a higher privilege level?
| a. | Linux and Windows | |
| b. | All major desktop operating systems | |
| c. | Recent versions of Windows | |
| d. | Recent versions of Mac OS X |
3.85 points
QUESTION 2
One of the actions that attackers typically attempt after compromising a system is to acquire the ability to mimic a normal privileged user. What is one way in which they may accomplish this?
| a. | Rebooting the compromised host | |
| b. | Exporting the password hash table | |
| c. | Pivoting from the compromised host to another target | |
| d. | Adding a privileged user account |
3.85 points
QUESTION 3
Which of the following is not normally an element of user accounts management audits?
| a. | Suspended accounts | |
| b. | Signed AUPs | |
| c. | Password hashing | |
| d. | Privileged accounts |
3.85 points
QUESTION 4
Vulnerability scans normally involve all of the following except which one?
| a. | The identification of active hosts on the network | |
| b. | The identification of operating systems | |
| c. | The identification of malware on all hosts | |
| d. | The identification of misconfigured settings |
3.85 points
QUESTION 5
Synthetic transactions are best described as
| a. | Transactions that are synthesized from multiple users interactions with the system | |
| b. | Real user monitoring (RUM) | |
| c. | A way to test the behavior and performance of critical services | |
| d. | Transactions that fall outside the normal purpose of a system |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
