Once an intruder has gained access to a remote system with a valid username and password, the
attacker will attempt to increase his privileges by escalating the used account to one that has
increased privileges. such as that of an administrator. What would be the best countermeasure to
protect against escalation of priveges?
A.
Give users tokens
B.
Give user the least amount of privileges
C.
Give users two passwords
D.
Give users a strong policy document
Explanation:
With less privileges it is harder to increase the privileges.