Automated mechanisms exist to prevent applications from executing at higher privilege levels than the user's privileges.
Does the organization use automated mechanisms to prevent applications from executing at higher privilege levels than the user's privileges?