Which security feature prevents a user from accidentally executing a potentially malicious program?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which security feature prevents a user from accidentally executing a potentially malicious program?

Explanation:
Controlling privilege elevation through user prompts helps prevent accidental execution of potentially malicious programs. User Access Control (UAC) sits between applications and sensitive parts of the operating system. When a program requests to perform actions that could affect system files, install software, or change security settings, UAC presents a consent dialog and may require administrator credentials. This friction gives the user a chance to notice something suspicious and either allow the action or cancel, reducing the probability that malware runs with high privileges without awareness. It embodies the practice of least privilege by ensuring code doesn’t operate with elevated rights unless explicitly authorized. The other options describe types of malware or infection vectors rather than protective mechanisms. A tunneling virus isn’t a security feature that stops execution. A boot sector virus targets the startup process to infect a system rather than prevent execution. Botnet trojans are malicious programs themselves, aimed at taking control, not guarding against it. In contrast, UAC provides a deliberate checkpoint at the moment a program might run with powerful rights.

Controlling privilege elevation through user prompts helps prevent accidental execution of potentially malicious programs. User Access Control (UAC) sits between applications and sensitive parts of the operating system. When a program requests to perform actions that could affect system files, install software, or change security settings, UAC presents a consent dialog and may require administrator credentials. This friction gives the user a chance to notice something suspicious and either allow the action or cancel, reducing the probability that malware runs with high privileges without awareness. It embodies the practice of least privilege by ensuring code doesn’t operate with elevated rights unless explicitly authorized.

The other options describe types of malware or infection vectors rather than protective mechanisms. A tunneling virus isn’t a security feature that stops execution. A boot sector virus targets the startup process to infect a system rather than prevent execution. Botnet trojans are malicious programs themselves, aimed at taking control, not guarding against it. In contrast, UAC provides a deliberate checkpoint at the moment a program might run with powerful rights.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy