Examlex
A security analyst receives an email from a peer that includes a sample of code from a piece of malware found in an application running in the organization's staging environment. During the incident response process, it is determined the code was introduced into the environment as a result of a compromised laptop being used to harvest credentials and access the organization's code repository. While the laptop itself was not used to access the code repository, an attacker was able to leverage the harvested credentials from another system in the development environment to bypass the ACLs limiting access to the repositories. Which of the following controls MOST likely would have interrupted the kill chain in this attack?
Irrational Emotions
Feelings that do not have a logical or reasonable basis, often disproportionate to the situation at hand.
Cognitive-Behavioural Therapy
A therapy approach that addresses dysfunctional emotions, behaviors, and cognitions through a goal-oriented, systematic procedure.
Behavioural Experiments
A technique in cognitive-behavioral therapy where patients test the reality of their beliefs through homework assignments.
Q18: A newly hired systems administrator is trying
Q34: A security analyst is scanning the network
Q42: An incident response team requires documentation for
Q43: A business analyst is drafting a risk
Q130: As part of an organization's compliance program,
Q286: A cloud administrator has deployed a new
Q290: In which of the following operating systems
Q414: A project manager is working with a
Q415: An organization has employed the services of
Q434: A product owner is reviewing the output