John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.Which of the following attack techniques is used by John?
A. Insider threat
B. Diversion theft
C. Spear-phishing sites
D. Advanced persistent threat
John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the t
-
- Site Admin
- Posts: 346795
- Joined: Mon May 16, 2022 9:31 am
John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the t
Register to view solutions, replies, and use search function. Request answer by replying! For more answers visit our other sites: AnswerAccurate HomeworkAnswerHelp AnswerHappy and QuestionAnswerDump