Yes. The problem scenario relies on an infected machine. This infection exploits UAC's default behavior to auto-elevate signed system binaries to achieve silent rights elevation. Of course, if UAC was a security
boundary, then it would not possess such behavior.
True or false? There are ways to run arbitrary code on your machine without you agreeing to it.