After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. Which of the following is this an example of?
A. Privilege escalation
B. Advanced persistent threat
C. Malicious insider threat
D. Spear phishing
Answer: B. Advanced persistent threat
You might also like to view...
P426 is an example of a PID
Indicate whether the statement is true or false
Draw the truth table of a full subtractor that directly subtracts bit A from B together with a borrow?in, to produce a difference D and a borrow?out.
What will be an ideal response?
Browser cookies are dangerous because they ________.
A. may contain sensitive private information about you and allow a website to track what pages you have visited B. allow a website to track what pages you have visited C. may contain sensitive private information about you D. taste bad
AVERAGE is an example of a ________ function.
a. logical b. statistical c. navigation d. summary