Once an intruder has gained access to a remote system with a valid username and password, the attacker will attempt to increase his privileges by escalating the used account to one that has increased privileges. such as that of an administrator.
What would be the best countermeasure to protect against escalation of priveges?
A . Give users tokens
B . Give user the least amount of privileges
C . Give users two passwords
D . Give users a strong policy document
Answer: B
Explanation:
With less privileges it is harder to increase the privileges.