nerdexam
(ISC)2(ISC)2

CISSP · Question #753

CISSP Question #753: Real Exam Question with Answer & Explanation

The correct answer is A: Programs that write to system resources. An attacker is most likely to target programs that write to system resources to gain privileged access to a system. System resources are the hardware and software components that are essential for the operation and functionality of a system, such as the CPU, memory, disk, network

Submitted by tom_us· Mar 5, 2026Security Architecture and Engineering

Question

Which of the following is an attacker MOST likely to target to gain privileged access to a system?

Options

  • APrograms that write to system resources
  • BPrograms that write to user directories
  • CLog files containing sensitive information
  • DLog files containing system calls

Explanation

An attacker is most likely to target programs that write to system resources to gain privileged access to a system. System resources are the hardware and software components that are essential for the operation and functionality of a system, such as the CPU, memory, disk, network, operating system, drivers, libraries, etc. Programs that write to system resources may have higher privileges or permissions than programs that write to user directories or log files. An attacker may exploit vulnerabilities or flaws in these programs to execute malicious code, escalate privileges, or bypass security controls. Programs that write to user directories or log files are less likely to be targeted by an attacker, as they may have lower privileges or permissions, and may not contain sensitive information or system calls. User directories are the folders or locations where users store their personal files or data. Log files are the records of events or activities that occur in a system or application.

Topics

#Privilege escalation#Attack vectors#System vulnerabilities

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions