8.2.9 - Privilege Escalation (Practice Questions)
Ultimate Boot CD
A hacker has gained physical access to a system and has changed an administrator's account password. Which of the following tools did the hacker most likely use to accomplish this?
DLL Hijacking
An attacker installed a malicious file in the application directory. When the victim starts installing the application, Windows searches in the application directory and selects the malicious file instead of the correct file. The malicious file gives the attacker remote access to the system. Which of the following escalation methods best describes this scenario?
Unattended installation
Which of the following privilege escalation risks happens when a program is being installed without the constant supervision of the IT employee and fails to clean up after?
CCleaner
Which of the following used to remove files and clear the internet browsing history?
A database that stores user passwords in Windows as an LM hash or a NTLM hash.
Which of the following best describes the Security Account Manager (SAM)?
Kerberoasting
Which of the following is a protocol that allows authentication over a non-secure network by using tickets or service principal names (SPNs)?
Ophcrack
Which of the following is a tools for cracking Windows login passwords using rainbow tables?
cPasswords
Which of the following is the name of the attribute that stores passwords in a Group Policy preference item in Windows?
Instigate multi-factor authentication and authorization.
Roger, a security analyst, wants to tighten up privileges to make sure each user has only the privileges they need to do their work. Which of the following additional countermeasure could he take to help protect privilege?