PCDRA Exam QuestionsBrowse all questions from this exam

PCDRA Exam - Question 36


Which statement is true for Application Exploits and Kernel Exploits?

Show Answer
Correct Answer: C

The ultimate goal of any exploit, particularly kernel exploits, is to reach the kernel. Kernel exploits target the core of the operating system, allowing an attacker to gain the highest level of control over the system. An exploit gaining kernel access can bypass most of the security mechanisms and execute actions without the need for privileged access. Application exploits may target user-level software, but ultimately many attackers aim to escalate privileges to reach the kernel for broader control.

Discussion

9 comments
Sign in to comment
Torben10Option: C
Jul 19, 2023

C should be right.

_tipsOption: A
Sep 20, 2023

Exploit Protection Overview An exploit is a sequence of commands that takes advantage of a bug or vulnerability in a software application or process. Attackers use these exploits to access and use a system to their advantage. Blocking any attempt to exploit a vulnerability in the chain will block the entire exploitation attempt. https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Endpoint-Protection

SpTesterOption: A
Jan 11, 2024

I vote A because exploit does NOT nead to reach the kernel. So not C. Kernel exploits are really hard to defend against as it's the very root of the OS. So not B. Definitively not D. So remains an A. So how can I explain that it is A? I would say with this circle that Palo Alto commonly spreads on the internet: https://www.paloaltonetworks.co.uk/research/apac-ondemand-webinar-2016-how-to-complete-the-security-puzzle-with-wildfire-and-traps Usually they say if we can interrupt one part of the exploit the chain will be broken. So in the center we got the application of an exploit permitted. Hence why I vote A. Ultimate goal of an exploit is to reach application.

7e078caOption: C
Feb 1, 2024

C, From https://beacon.paloaltonetworks.com

0707bc6Option: C
Apr 10, 2024

It's clearly stated in Beacon > Cortex XDR 3: Getting Started with Endpoint Protection > Cortex XDR 3: Exploit Protection > Application Exploit Prevention > Application Exploits and Kernel Exploits https://beacon.paloaltonetworks.com/uploads/resource_courses/targets/2394329/original/index.html?_courseId=905962#/page/612c6346db387a0de433778d

_tipsOption: C
Sep 22, 2023

Regarding to this page https://www.csoonline.com/article/571799/exploit-chains-explained-how-and-why-attackers-target-multiple-vulnerabilities.html “The goal with exploit chain attacks is to gain kernel/root/system level access to compromise a system in order to execute an attack,” he answer is C

besikOption: C
Mar 5, 2024

The attacker's ultimate goal is to reach the kernel because if he reaches the kernel, he can do anything he wants and to execute something he will not need privileged access. There are many mitigation techniques with Application Exploits but not many for the kernel.

ChiquitabanditaOption: A
Mar 22, 2024

I think it is A, only because the other answers feel wrong but I can't find definite reason why A is right

abd1234Option: C
Jun 19, 2024

Kernel is the goal.