Q: 18
An organization's threat intelligence team notes a recent trend in adversary privilege escalation
procedures. Multiple threat groups have been observed utilizing native Windows tools to bypass
system controls and execute commands with privileged credentials. Which of the following controls
would be most effective to reduce the rate of success of such attempts?
Options
Discussion
I actually would pick B here. MFA adds another layer, making privilege escalation tougher even if native tools get used.
Probably D-blocking untrusted apps is key here. From what I saw in the official study guide and practice exams, tools like PowerShell get abused all the time. Only app control really stops those escalation tricks cold. If anyone saw a different answer in recent test questions, let me know.
B. I think MFA helps a lot with privileged actions. Not sure if that's enough though, can someone confirm?
Be respectful. No spam.