Examlex
A security analyst receives an email from a peer that includes a sample of code from a piece of malware found in an application running in the organization's staging environment. During the incident response process, it is determined the code was introduced into the environment as a result of a compromised laptop being used to harvest credentials and access the organization's code repository. While the laptop itself was not used to access the code repository, an attacker was able to leverage the harvested credentials from another system in the development environment to bypass the ACLs limiting access to the repositories. Which of the following controls MOST likely would have interrupted the kill chain in this attack?
Pay Less Attention
Act of giving reduced focus or importance to something, potentially leading to overlooking or ignoring it.
Indeterminate Cleavage
Type of cleavage characteristic of deuterostomes; during early cleavage each cell has the potential of developing into a complete embryo. Compare with determinate cleavage.
Deuterostomes
A major lineage of animals characterized by embryonic development where the anus forms before the mouth, including vertebrates and several other phyla.
Protostomes
A group of animals characterized by developing the mouth earlier than the anus during embryonic development, including invertebrates like mollusks and annelids.
Q13: A company wants to establish a threat-hunting
Q21: A cloud administrator for an ISP identified
Q63: While conducting a BIA for a proposed
Q72: When designing a new cloud-enabled application, an
Q178: A company has made it a spending
Q224: A security and risk team requires a
Q230: Which of the following social engineering vulnerabilities
Q236: A cloud administrator works for an online
Q295: A security analyst is classifying data based
Q320: A technician wants to write a script