An organization's threat intelligence team notes a recent trend in adversary privilege escalation procedures. Multiple threat groups have been observed utilizing native Windows tools to bypass system controls and execute commands with privileged credentials. Which of the following controls would be most effective to reduce the rate of success of such attempts?
The correct answer is A. Set user account control protection to the most restrictive level on all devices.
In this scenario, adversaries are leveraging native Windows tools to escalate privileges and bypass system controls. One effective way to reduce the success rate of such privilege escalation attempts is to use User Account Control (UAC) to restrict how and when users or applications can execute commands with elevated privileges.
UAC (User Account Control) in Windows is a security feature that helps prevent unauthorized changes to the operating system. By setting UAC to the most restrictive level, the system will prompt for administrative credentials before allowing any program to run with elevated privileges. This makes it more difficult for an adversary to gain elevated privileges without user intervention, even if they are exploiting native tools.
When set to a more restrictive level, UAC helps protect the system from unauthorized privilege escalation by requiring users to confirm or provide credentials before granting elevated privileges. This significantly reduces the risk of attackers executing commands with privileged credentials.
Why the Other Options Are Incorrect:
Implement MFA requirements for all internal resources:
Harden systems by disabling or removing unnecessary services:
Implement controls to block execution of untrusted applications:
No Payment Cards Needed
Discover a range of courses designed to provide you with the knowledge and skills needed to excel in your chosen field.
You don’t need one month to study and pass your test.
With Prepsaret, it takes you a few days to grasp all the concepts needed to pass your exams