GIAC Related Exams
GCED Exam
Michael, a software engineer, added a module to a banking customer’s code. The new module deposits small amounts of money into his personal bank account. Michael has access to edit the code, but only code reviewers have the ability to commit modules to production. The code reviewers have a backlog of work, and are often willing to trust the software developers’ testing and confidence in the code.
Which technique is Michael most likely to engage to implement the malicious code?
What piece of information would be recorded by the first responder as part of the initial System Description?
Which tasks would a First Responder perform during the Identification phase of Incident Response?