Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 76 discussion

Actual exam question from CompTIA's SY0-501
Question #: 76
Topic #: 1
[All SY0-501 Questions]

Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?

  • A. Privilege escalation
  • B. Pivoting
  • C. Process affinity
  • D. Buffer overflow
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Aarongreene
3 years, 8 months ago
gibson: privilege escalation --The process of gaining elevated rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges. buffer overflow--- An error that occurs when an application receives more input, or different input, than it expects. It exposes system memory that is normally inaccessible.
upvoted 3 times
...
db444
3 years, 11 months ago
A, not buffer overflow because it accesses restricted areas of OS not memory.
upvoted 2 times
...
Not_My_Name
4 years, 1 month ago
I think it depends on how you define "areas of the OS". Memory isn't necessarily part of the OS, but the OS runs in memory. As such, gaining access to restricted areas in the memory ultimately provides access to restricted areas of the OS. It's crap wording; hard to say what angle they're looking for. Both A and D are equally correct to me.
upvoted 1 times
...
Shahrukh__s
4 years, 1 month ago
The answer would be D if they had given restricted area of the memory but the catch here is restricted are of the OS so the answer should be A
upvoted 4 times
...
Hanzero
4 years, 2 months ago
"Restricted areas", only accessible by using higher privileges.
upvoted 4 times
...
mlonz
4 years, 4 months ago
this discussion session is more confusing. I wish these material providers hire a professor who can explain every answer instead of every sharing their limited thoughts and knowledge
upvoted 4 times
...
Xhibit
4 years, 4 months ago
Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
upvoted 2 times
...
kdce
4 years, 5 months ago
A, (i.e. compromised Admin acct, restricted areas of the OS)
upvoted 1 times
...
MelvinJohn
4 years, 6 months ago
D. Buffer Overflows always require an INTERACTIVE app issuing a prompt which fails to check for response length. with Privilege Escalation hackers can use a NON-INTERACTIVE program (application) to gain access. Privilege escalation happens when a malicious user exploits a bug, design flaw, or configuration error in an APPLICATION (either a batch program or an interactive program) or OPERATING SYSTEM utility program to gain elevated access to resources that should normally be unavailable to that user. They expand their privileges by taking over another account and misusing the legitimate privileges granted to the other user - or they attempt to gain more permissions or access with an existing ACCOUNT they have compromised. https://www.cynet.com/cyber-attacks/privilege-escalation/
upvoted 1 times
...
000_000
4 years, 7 months ago
"restricted areas of the OS"... need to use Privilege escalation
upvoted 3 times
...
MelvinJohn
4 years, 8 months ago
D. A buffer overflow occurs a hacker appends their executable code or commands to the end of a reply to a prompt from an interactive app - and the reply exceeds the expected length, causing the code or commands to execute within restricted areas of memory. The OS segments its memory, confining each executing task with an authorized area. The buffer overflow causes an intrusion into unauthorized/restricted memory.
upvoted 1 times
chakpam
4 years, 8 months ago
Not really sure how the answer should be A.Privilege escalation.? I think it answer should be D. "exploitation of an interactive process to access otherwise restricted areas of the OS".
upvoted 2 times
Jasonbelt
4 years, 4 months ago
It is A because that is how you gain higher access.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...