CompTIA PenTest+ 2025 – 400 Free Practice Questions to Pass the Exam

Image Description

Question: 1 / 400

What technique might be exploited on a Windows server to achieve privilege escalation?

Privilege delegation

Token impersonation

Sticky Bits

The technique that can be exploited on a Windows server to achieve privilege escalation is token impersonation. In a Windows environment, a security token contains user credentials and group memberships that determine what resources a process can access. Attackers can exploit weaknesses in token management to impersonate a more privileged user or system account, allowing them to elevate their own privileges beyond what their account typically allows.

This technique can be particularly effective if an application or service running with higher privileges does not properly restrict access to its security tokens. By leveraging token impersonation, an attacker can execute processes or access files with the rights of the impersonated user, potentially leading to gain administrative privileges on the system.

Privilege delegation, sticky bits, and service account exploitation are relevant topics in the context of security and privilege management, but they do not specifically illustrate the mechanism by which an attacker can elevate their privileges as effectively as token impersonation does in Windows.

Get further explanation with Examzify DeepDiveBeta

Service account exploitation

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy