An operator has gained control of a Windows workstation. They want to set up an account that blends with typical user information. Which method accomplishes this objective?
Overwrite the main credential file with one copied from another host
Add a new credential inside a secondary program’s configuration so it appears in a hidden registry area
Use a typical Windows tool to make a new profile named in line with existing users, then assign higher privileges
Enable a built-in default profile and expand its privileges through system policies
A contender uses a standard approach to create and name the new account so it fits existing patterns, then adjusts privileges as needed for further testing. Simply replacing or removing core files can trigger alarms, changing other platform settings might not grant a durable account, and reactivating a dormant profile often lacks the access level needed for the scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to name the new account in line with existing users?
Open an interactive chat with Bash
How do you assign higher privileges to a new account in Windows?
Open an interactive chat with Bash
What risks are associated with reactivating a built-in default profile?