exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 148 discussion

Actual exam question from CompTIA's CS0-002
Question #: 148
Topic #: 1
[All CS0-002 Questions]

A security analyst discovers a standard user has unauthorized access to the command prompt, PowerShell, and other system utilities. Which of the following is the BEST action for the security analyst to take?

  • A. Disable the appropriate settings in the administrative template of the Group Policy.
  • B. Use AppLocker to create a set of whitelist and blacklist rules specific to group membership.
  • C. Modify the registry keys that correlate with the access settings for the System32 directory.
  • D. Remove the user's permissions from the various system executables.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
encxorblood
Highly Voted 2 years, 2 months ago
Selected Answer: B
The BEST action for the security analyst to take when a standard user has unauthorized access to the command prompt, PowerShell, and other system utilities is to use AppLocker to create a set of whitelist and blacklist rules specific to group membership. Therefore, the correct answer is B. AppLocker is a Windows feature that enables organizations to specify which applications are allowed to run on a computer system. By creating a set of whitelist and blacklist rules specific to group membership, the security analyst can restrict access to command prompt, PowerShell, and other system utilities for the standard user. This will help to prevent unauthorized access and misuse of these tools.
upvoted 7 times
tutita
1 year, 11 months ago
the question is talking about an (just one) standard user with "extra" access to system assets, so by disabling that will do, so its D
upvoted 2 times
uday1985
1 year, 7 months ago
How about new users? isn't this involve manually configuring for each alert generated? rather than automating the process?
upvoted 2 times
...
RobV
1 year, 4 months ago
It did not specify ONE standard user. Standard user is also a group.
upvoted 1 times
...
...
...
Yerfez
Highly Voted 2 years, 7 months ago
Selected Answer: A
A is correct
upvoted 6 times
...
zecomeia_007
Most Recent 9 months, 2 weeks ago
Selected Answer: B
AppLocker is a powerful tool designed to control which applications users and groups can run on a system. By creating specific rules based on group membership, the analyst can effectively restrict access to command prompt, PowerShell, and other system utilities for standard users while allowing authorized users to continue using them.
upvoted 1 times
...
Ha89
10 months, 2 weeks ago
Selected Answer: D
D it is.
upvoted 1 times
...
FT000
1 year, 2 months ago
Selected Answer: D
For me, the keyword here is 'unauthorised access'. If we are to use GPO or whitelist/blacklist, it means currently he is authorised albeit by mistake only, but authorised. So I am going with D as that removes the user's access to executables and brings reinstates his account to authorised accesses only.
upvoted 1 times
...
RobV
1 year, 4 months ago
Selected Answer: B
B. Use AppLocker to create a set of whitelist and blacklist rules specific to group membership. AppLocker is a security feature in Windows that allows you to create policies to control which applications are allowed to run on a system. In this scenario, using AppLocker to create a set of whitelist rules specific to group membership would be the best action. This approach would allow the security analyst to specify which applications (such as the command prompt, PowerShell, and other system utilities) are allowed to run based on the user's group membership.
upvoted 1 times
...
32d799a
1 year, 5 months ago
Selected Answer: B
AppLocker is a Microsoft Windows feature that allows administrators to create policies to control which applications are allowed to run on a system. In this scenario, using AppLocker to create a set of rules specific to group membership would be an effective way to control and restrict the unauthorized access to command prompt, PowerShell, and other system utilities.
upvoted 1 times
...
novolyus
1 year, 5 months ago
Applocker? who mentioned anything about using Windows?
upvoted 1 times
skibby16
1 year, 5 months ago
Powershell is windows native scripting tool
upvoted 1 times
...
...
grelaman
1 year, 8 months ago
Selected Answer: A
This will prevent the standard user from accessing the command prompt, PowerShell, and other system utilities, regardless of their permissions to the individual executables. Group Policy can be used to enforce a wide variety of administrative rules. It's the best administrative option from my perspective.
upvoted 1 times
...
naleenh
1 year, 8 months ago
Selected Answer: A
Disabling the appropriate settings in the administrative template of the Group Policy can help restrict access to command prompt, PowerShell, and other system utilities for standard users.
upvoted 1 times
...
tutita
1 year, 11 months ago
Selected Answer: D
the question is talking about an (just one) standard user with "extra" access to system assets, so by disabling that will do, so its D
upvoted 3 times
...
kiduuu
2 years ago
Selected Answer: D
Remove the user's permissions from the various system executables is the BEST action for the security analyst to take.
upvoted 1 times
...
JoshuaXIV
2 years ago
Selected Answer: D
Based on the scenario, there is a malicious event happened to a standard user which has access to system utilities beyond the set permission. Ofcourse, first we will isolate it. Why not A? because it may affect other legitimate users as well. Just my thoughts on the question.
upvoted 1 times
...
trainingsmits
2 years, 4 months ago
Selected Answer: D
The question states that the user is a "standard user", not an administrator account, with extra permissions. Disabling the settings in the administrative template (A) will not affect a standard user unless they are part of the administrative group. D is the only answer that makes sense.
upvoted 2 times
trojan123
2 years, 3 months ago
tandard user permissions can also be set using administrative templates in Group Policy Objects (GPOs). These templates can be used to configure settings for standard users just like they can be used to configure settings for privileged users. For example, an organization can use administrative templates to configure security settings, software installation and maintenance settings, and settings for specific applications for standard users. It's important to note that while standard users may not have the ability to modify GPO settings themselves, the administrative templates can be used by a privileged user, such as an administrator, to configure settings for standard users. These templates can be used to restrict access to certain features or applications for standard users, or to configure settings that will enforce specific policies for standard users. It's important to review and test the changes made by GPO for standard users, to ensure that the changes do not negatively impact their daily work.
upvoted 2 times
...
...
Comptia_Secret_Service
2 years, 5 months ago
Selected Answer: D
This should D. The problem states the user has been given excessive permissions violating the principle of least privilege, removing the user's access to stated executables will correct the user's permission. Changing settings in the group policy is excessive and is actually needed for admin roles, the question also didn't state the use of Group Policies to apply user permissions.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago