Examlex
A security consultant is analyzing data from a recent compromise. The following data points are documented: Access to data on share drives and certain networked hosts was lost after an employee logged in to an interactive session as a privileged user. The data was unreadable by any known commercial software. The issue spread through the enterprise via SMB only when certain users accessed data. Removal instructions were not available from any major antivirus vendor. Which of the following types of malware is this an example of?
Affect Heuristic
A mental shortcut that influences the way people make decisions based on their emotions and feelings.
Loss Aversion
A behavioral finance concept that describes the tendency for people to prefer avoiding losses to acquiring equivalent gains.
Financial Markets
Platforms or environments where buyers and sellers trade financial securities, commodities, and other fungible items of value.
Behavioral Finance
Behavioral Finance studies how psychological influences and biases affect the financial behaviors of investors and financial practitioners.
Q96: A security administrator is implementing a secure
Q123: A security analyst is hardening a large-scale
Q222: After a user reports slow computer performance,
Q267: A security engineer is faced with competing
Q472: A new hire wants to use a
Q490: Which of the following vulnerability types would
Q546: Penetration testing is distinct from vulnerability scanning
Q697: The Chief Information Security Officer (CISO) is
Q988: Ann, a security administrator, wants to ensure
Q1087: An information security specialist is reviewing the