New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 2 Question 35 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 35
Topic #: 2
[All CPEH-001 Questions]

Once an intruder has gained access to a remote system with a valid username and password, the attacker will attempt to increase his privileges by escalating the used account to one that has increased privileges. such as that of an administrator. What would be the best countermeasure to protect against escalation of priveges?

Show Suggested Answer Hide Answer
Suggested Answer: B

With less privileges it is harder to increase the privileges.


Contribute your Thoughts:

0/2000 characters
France
4 months ago
B is the best option, no doubt about it!
upvoted 0 times
...
Jina
4 months ago
Not sure if a strong policy is enough, honestly.
upvoted 0 times
...
Marica
4 months ago
Two passwords? That sounds confusing!
upvoted 0 times
...
Loreta
4 months ago
I think A could help too, but not as much.
upvoted 0 times
...
Renay
5 months ago
Definitely B, least privileges is key!
upvoted 0 times
...
Sharan
5 months ago
I recall something about strong policy documents being important, but I don't think they directly prevent privilege escalation like the least privilege does.
upvoted 0 times
...
Elli
5 months ago
I practiced a similar question about privilege escalation, and I think the best approach is to limit user permissions as much as possible. So, B seems right.
upvoted 0 times
...
Claribel
5 months ago
I'm not entirely sure, but I feel like giving users two passwords could add some security. Maybe that's option C?
upvoted 0 times
...
Wade
5 months ago
I remember discussing the principle of least privilege in class, so I think option B makes the most sense.
upvoted 0 times
...
Barney
5 months ago
Okay, let's think this through. Resource elasticity means the ability to dynamically add or remove resources as needed. So the two correct answers are probably B and D, which mention deploying VMs and adding VMs when traffic is high.
upvoted 0 times
...
Myong
5 months ago
Okay, let's see. We need to enable remote access to OneDrive for Business, and the company is using Windows 10 devices with Autopilot. I'm thinking option C, enrolling the devices in Intune, might be the way to go. That would give us centralized device management and control.
upvoted 0 times
...
Ollie
5 months ago
This question seems pretty straightforward. I'm confident I can figure out the false statement about Intrusion Detection Systems.
upvoted 0 times
...
Staci
5 months ago
Hmm, I'm a bit confused by this question. Is a pipeline lookup transformation related to a lookup associated with a source like JMS or SAP? I'll have to review my notes on different types of lookups to figure this out.
upvoted 0 times
...

Save Cancel