Which Windows utility is commonly used to run a program with the credentials of a different user?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which Windows utility is commonly used to run a program with the credentials of a different user?

Explanation:
Running a program with the credentials of a different user in Windows is accomplished with the Runas utility. It starts a program under another user’s account by specifying that user’s name and password, so the new process runs with that account’s permissions. For example, you can launch a program with runas /user:DOMAIN\Username "path\to\program.exe" and then enter the password when prompted. There are variations like /netonly, which authenticates only for network resources while the program runs under your current account. This makes Runas the go-to tool for executing actions with alternate credentials. Shims and Application Shimming focus on changing how an application behaves to fix compatibility issues, not on credential changes. Path Interception involves redirecting or intercepting file system paths, which also isn’t about running a program as another user.

Running a program with the credentials of a different user in Windows is accomplished with the Runas utility. It starts a program under another user’s account by specifying that user’s name and password, so the new process runs with that account’s permissions. For example, you can launch a program with runas /user:DOMAIN\Username "path\to\program.exe" and then enter the password when prompted. There are variations like /netonly, which authenticates only for network resources while the program runs under your current account. This makes Runas the go-to tool for executing actions with alternate credentials.

Shims and Application Shimming focus on changing how an application behaves to fix compatibility issues, not on credential changes. Path Interception involves redirecting or intercepting file system paths, which also isn’t about running a program as another user.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy