exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 147 discussion

Actual exam question from CompTIA's CS0-003
Question #: 147
Topic #: 1
[All CS0-003 Questions]

An organization's threat intelligence team notes a recent trend in adversary privilege escalation procedures. Multiple threat groups have been observed utilizing native Windows tools to bypass system controls and execute commands with privileged credentials. Which of the following controls would be most effective to reduce the rate of success of such attempts?

  • A. Set user account control protection to the most restrictive level on all devices
  • B. Implement MFA requirements for all internal resources
  • C. Harden systems by disabling or removing unnecessary services
  • D. Implement controls to block execution of untrusted applications
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 1 year, 5 months ago
Selected Answer: C
Sadly there's a character limit so I can't knowledge dump, but the answer is indeed C. When you disable unnecessary services, they can't privilege escalate. Toaster and the ones below me are thinking you privesc on the machine, that's rarely the case on initial entry, you'll get creds, scan the internal network for services like SMB, WinRM, SSH, SQL, internal web hosts, etc. And blast found creds at those. There's linux apps like crackmapexec that will spray at every open SMB connection and let you know if they're local admin on that machine, evilwinRM will basically give you a command prompt, and you use your initial creds to find more creds. Someone maybe left some powershell history, has an insecure custom app or path, tons of ways. This happens every day and by hardening the system you can prevent or at least contain the threat.
upvoted 11 times
...
ms123451
Highly Voted 1 year, 8 months ago
Selected Answer: C
The question is saying windows native tools, blocking untrusted apps has nothing to do with the question
upvoted 6 times
kmordalv
1 year, 7 months ago
I agree with your answer
upvoted 2 times
...
...
alialzehhawi
Most Recent 7 months, 2 weeks ago
D. Implementing controls to block execution of untrusted applications can prevent privilege escalation attacks that leverage native Windows tools, such as PowerShell, WMIC, or Rundll32
upvoted 1 times
...
Omo_Mushin
9 months, 2 weeks ago
Setting UAC to the most restrictive level ensures that even if an attacker gains initial access to a system, they will face additional prompts and controls when attempting to escalate privileges or execute commands with higher privileges. Given the trend of adversary privilege escalation using native Windows tools, setting user account control protection to the most restrictive level on all devices (option A) is the most effective control. It directly addresses the method of attack described by adding an additional layer of security and control over privilege escalation attempts. Therefore, option A is the best choice to reduce the rate of success of privilege escalation attempts using native Windows tools.
upvoted 4 times
...
section8santa
1 year, 1 month ago
Selected Answer: D
This approach, often referred to as application whitelisting or the use of application control policies, is effective in preventing the execution of unauthorized or malicious software, including the misuse of legitimate tools for malicious purposes. By only allowing trusted applications to run, you significantly reduce the ability of an adversary to use native tools in unintended ways. This is particularly effective against the described technique, which involves using native tools for privilege escalation.
upvoted 1 times
...
bettyboo
1 year, 1 month ago
Selected Answer: C
C. Harden systems by disabling or removing unnecessary services
upvoted 1 times
...
T1bii
1 year, 2 months ago
According to ChatGPT, A is the correct answer : UAC helps prevent unauthorized system changes asking for prompt consent or more before elevating privileges. My experience would lead me to A
upvoted 2 times
Mehe323
11 months, 4 weeks ago
I fed the question to ChatGPT too and it said C.
upvoted 5 times
...
...
LiveLaughToasterBath
1 year, 5 months ago
Selected Answer: D
While adversary may use native tools to access system, they will invariably use hacking tools to escalate an attack. Think of ssh-ing into a sys and running a hash-cracking tool. That tool will be foreign to the system. That's the execution of an untrusted app that needs blocking.
upvoted 2 times
[Removed]
1 year, 5 months ago
Thats untrue. It's C. You also wouldn't run hash cracking tools in the compromised machine, you would exfil them to the attacker machine.
upvoted 2 times
...
...
chaddman
1 year, 6 months ago
Selected Answer: D
Implement controls to block execution of untrusted applications (D): This would include application whitelisting, which allows only approved applications to run. Since the adversaries are using native Windows tools (which are usually trusted), restricting execution to a list of approved applications can help mitigate these types of attacks.
upvoted 1 times
...
Jong1
1 year, 6 months ago
Selected Answer: A
etting user account control (UAC) protection to the most restrictive level on all devices can be effective in reducing the rate of success of attempts involving privilege escalation using native Windows tools. UAC helps prevent unauthorized changes to the system by notifying users or administrators when potentially harmful actions are being attempted. By setting UAC to the highest level, users and applications will need to prompt for consent or administrative credentials before performing actions that could potentially modify the system or execute privileged commands
upvoted 4 times
...
danscbe
1 year, 7 months ago
Selected Answer: C
The question specifically states the privilege escalation is being done via "native tools". By default, the operating system will trust native tools-- They are native. Blocking untrusted applications won't solve anything.
upvoted 4 times
stolleryp
1 year, 6 months ago
I think you have misread the question. We're trying to reduce the rate of success of these attempts. So yes, blocking untrusted apps won't solve anything - and definitely wouldn't reduce the rate of success.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago