List of questions
Related questions
Question 334 - 312-50v12 discussion
John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?
A.
Advanced persistent theft
B.
threat Diversion theft
C.
Spear-phishing sites
D.
insider threat
Your answer:
0 comments
Sorted by
Leave a comment first