Page 1 of 1

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the t

Posted: Thu Apr 06, 2023 1:18 pm
by answerhappygod
John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.
Which of the following attack techniques is used by John?

A. Insider threat
B. Diversion theft
C. Spear-phishing sites
D. Advanced persistent threat