Question: Security Assessment and Testing Which operating systems allows users to temporarily elevate their privileges in order to launch an application at a higher privilege level?

Security Assessment and Testing

Which operating systems allows users to temporarily elevate their privileges in order to launch an application at a higher privilege level?

a.

Linux and Windows

b.

All major desktop operating systems

c.

Recent versions of Windows

d.

Recent versions of Mac OS X

3.85 points

QUESTION 2

One of the actions that attackers typically attempt after compromising a system is to acquire the ability to mimic a normal privileged user. What is one way in which they may accomplish this?

a.

Rebooting the compromised host

b.

Exporting the password hash table

c.

Pivoting from the compromised host to another target

d.

Adding a privileged user account

3.85 points

QUESTION 3

Which of the following is not normally an element of user accounts management audits?

a.

Suspended accounts

b.

Signed AUPs

c.

Password hashing

d.

Privileged accounts

3.85 points

QUESTION 4

Vulnerability scans normally involve all of the following except which one?

a.

The identification of active hosts on the network

b.

The identification of operating systems

c.

The identification of malware on all hosts

d.

The identification of misconfigured settings

3.85 points

QUESTION 5

Synthetic transactions are best described as

a.

Transactions that are synthesized from multiple users interactions with the system

b.

Real user monitoring (RUM)

c.

A way to test the behavior and performance of critical services

d.

Transactions that fall outside the normal purpose of a system

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!