GIAC Related Exams
GCED Exam
What should happen before acquiring a bit-for-bit copy of suspect media during incident response?
Michael, a software engineer, added a module to a banking customer’s code. The new module deposits small amounts of money into his personal bank account. Michael has access to edit the code, but only code reviewers have the ability to commit modules to production. The code reviewers have a backlog of work, and are often willing to trust the software developers’ testing and confidence in the code.
Which technique is Michael most likely to engage to implement the malicious code?
Which tasks would a First Responder perform during the Identification phase of Incident Response?